Podcast

Networking With Ehsan – Podcast

What is ZTNA? (Agentless)

In this episode, together with Navid, Mina, and Ehsan, we dive into one of the most important concepts in the world of network security:
ZTNA – Zero Trust Network Access
1️⃣ Introduction to ZTNA
Why “no one is trusted by default”
The role of identity and device posture in modern security
2️⃣ Comparing ZTNA with VPN
Why VPN is no longer enough
Application-based security vs. full network access
Advantages, weaknesses, and real-world scenarios
3️⃣ Agentless ZTNA Architecture
Secure access without installing software on the user device

What is ZTNA? (Agentless)

Network That Never Sleeps - OOB

In this episode of Ehsan’s Tech Lounge, titled “Network That Never Sleeps,” we explored one of the most critical components of network infrastructure: Out-of-Band Management (OOB).

In this discussion, we explained what OOB is, why it plays a key role in network security and resilience, and how, during a crisis, it often becomes the only active path to regain control of the network.

We then took a brief look at ZTNA – Zero Trust Network Access, and finally analyzed Meta’s data center–scale OOB solution — an architecture based on Passive Optical Network (PON) technology that redefines resilience in the modern data center world.

Network That Never Sleeps - OOB

Business Logic Attacks

In this episode of Ehsan’s Tech Lounge, we dive into a silent but very serious threat: Business Logic Attacks — attacks that do not rely on code injection, but instead exploit the order of requests (user journey) and the logic of the application. These attacks often stay invisible to traditional firewalls and security tools.

What you’ll learn in this video:
• The difference between a traditional WAF and the need for modern API Security solutions
• Three real, relatable scenarios: coupon abuse, ATO (Account Takeover), and race conditions in fintech
• How API inventory, distributed tracing, and behavior baselining help uncover logic-based attacks
• A practical playbook for detection, rapid response, and remediation — actionable steps that DevOps and SecOps teams should start implementing today

If you found this video useful, hit the Like button and share it with your technical friends — especially DevOps teams, SecOps teams, and system architects.

Business Logic Attacks

Cisco Secure Analytics (Stealthwatch) Explained: NDR for Modern Enterprise Networks

In this episode of the Tech Lounge series, we explored one of the most important network security solutions: NDR – Network Detection & Response.
We reviewed the architecture of Cisco Secure Analytics (SNA) — formerly known as Stealthwatch — analyzed common customer challenges, and explained how network traffic analytics can detect malicious behavior even without signatures.

🔍 Topics we covered:
• What is NDR and why is it critical today?
• SNA architecture and components (Flow Collector, Flow Sensor, UDP Director, etc.)
• The role of telemetry and NetFlow in security visibility
• A brief demo of the SNA environment

Cisco Secure Analytics (Stealthwatch)

Inside Cisco SD-WAN: How Modern WAN Automation Works

In this episode, we explore Cisco SD-WAN — one of the most modern and widely used enterprise networking solutions in the world.
We’ll explain how SD-WAN separates the control and data planes, how it simplifies and secures connectivity between branch locations, and how, using vManage, vBond, and vSmart, it automates policy and routing management.
If you’re looking for a real understanding of an automated, policy-driven, and secure WAN, this episode is for you!

Inside Cisco SD-WAN

QUIC: Performance Revolution or Security Blind Spot?

In the fourth episode of Ehsan’s Tech Lounge Podcast, we explore how HTTP/3 powered by QUIC promises blazing-fast connections and a better user experience — but also introduces new visibility and inspection challenges for security vendors. We trace the evolution of HTTP protocols, unpack the architectural benefits of QUIC, and ask the critical question: Can our firewalls keep up? Join us as we analyze how vendors are tackling decryption, telemetry, and detection inside encrypted QUIC traffic.

QUIC: Performance Revolution or Security Blind Spot?

Cisco HyperFabric AI

We introduce Cisco HyperFabric AI—covering architecture, benefits, and learning paths for engineers entering AI infrastructure.

Cisco HyperFabric AI