Player FM - Internet Radio Done Right
Checked 2d ago
Ajouté il y a deux ans
Contenu fourni par Robert Vamosi. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Robert Vamosi ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Player FM - Application Podcast
Mettez-vous hors ligne avec l'application Player FM !
Mettez-vous hors ligne avec l'application Player FM !
Error Code
Tout marquer comme (non) lu
Manage series 3469998
Contenu fourni par Robert Vamosi. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Robert Vamosi ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
63 episodes
Tout marquer comme (non) lu
Manage series 3469998
Contenu fourni par Robert Vamosi. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Robert Vamosi ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
63 episodes
Tous les épisodes
×E
Error Code

1 EP 62: Defending the Unknown in OT Security 31:38
31:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé31:38
ROI is always a tricky subject in cybersecurity. If you’re paying millions of dollars in securing your OT networks, you’d want to be able to show that it was worth it. Andrew Hural of UnderDefense talks about the need for continuous vigilance, risk management, and proactive defense, acknowledging both the human and technological elements in cybersecurity and how just because something didn’t happen doesn’t mean that it didn’t.…
E
Error Code

1 EP 61: Applying Zero Trust to OT systems 36:07
36:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé36:07
Zero Trust is a security model based on default-deny policies and fine-grained access control governed by identity, authentication, and contextual signals. For RSAC 2025 , John Kindervag, Chief Evangelist of Illumio and the creator of Zero Trust, talks about introducing a "protect surface" into legacy OT systems —isolating critical data, applications, assets, or services into secure zones for targeted Zero Trust implementation.…
E
Error Code

1 EP 60: Hacking Solar Power Inverters 39:21
39:21
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé39:21
Solar power systems are rapidly becoming essential elements of power grids throughout the world, especially in the US and EU. However, cybersecurity for these systems is often an afterthought, creating a growing risk to grid stability and availability. Daniel de Santos, Head of Research at Forescout , talks about his recent research into vulnerabilities associated with solar panel investors, how they might affect the power grid or the end-user, and what we can do about it.…
E
Error Code

1 EP 59: Automotive Hacking In Your Own Garage 36:15
36:15
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé36:15
Gone are the days when you could repair your own car. Even ICE cars have more electronics than ever before. Alexander Pick is an independent hardware hacker specializing in automotive systems. He says if you start off small, like looking at ECUs, there’s a lot of great research yet to be done by both hobbyists and professionals alike.…
E
Error Code

1 EP 58: Hacking Office Supplies 45:42
45:42
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé45:42
It’s becoming easier for criminals to use counterfeit or altered chips in common office products, such as printer toner cartridges, with the aim of espionage or simple financial gain. Tony Moor, Senior Director Of Silicon Lab Services For IOActive , explains how the hacking embedded silicon within common objects in our day to day lives is becoming more common, and what the consequences of this lack of security might mean.…
E
Error Code

1 EP 57: Strengthening Embedded Device Security with Cloud-Based SCADA 33:36
33:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé33:36
Embedded devices need basic security measures like multi-factor authentication and unique credentials to reduce vulnerabilities and protect against cyber threats. Mauritz Botha, co-founder and CTO of XiO Inc., explains that cloud-based SCADA can update old systems and provide the visibility that’s currently missing.…
E
Error Code

1 EP 56: Hacking OT and ICS in the Era of Cloud and Automation 42:19
42:19
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé42:19
As industrial enterprises lurch toward digital transformation and Industry 4.0, a new report looks at the security OT systems and finds it wanting. Grant Geyer, the Chief Strategy Officer for Claroty , talks about the findings from over one million devices in the field today, and what industries must do now to secure them.…
E
Error Code

1 EP 55: Building Secure Storage for Autonomous Vehicles 28:48
28:48
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé28:48
I recently rode in a Waymo, Google’s self-driving taxi service, and it was fantastic. What if we took that vehicle off the safe roads of California and put it in a warzone like Ukraine? If it was captured, could the enemy get its data or its algorithms? Brent Hansen, Chief Growth Officer at Cigent, talks about the data risks associated with autonomous vehicles and remote servers, and how data security is essential in these in the field locations.…
E
Error Code

1 EP 54: From Cyber Chaos to Control: Lessons from a Kansas Water District 34:01
34:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé34:01
Imagine your best worst day during a cyber attack. Can you switch to manual systems in case of a failure? Has your team practiced for that? Dave Gunter, OT Cybersecurity Director at Armexa , discusses how a water and waste water utility in Kansas responded correctly to a cyberattack in 2024 by falling back to manual and issuing clear, and concise press releases to assure the public that their water was safe to drink.…
E
Error Code

1 EP 53: Securing Smart OT Systems Already In The Field 31:17
31:17
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé31:17
This is the story of how the security of OT devices in the field can be modernized virtual isolation in the cloud, adding both authentication and encryption into the mix. Bill Moore, founder and CEO of Xona, explains how you can virtualize the OT network and interact with it, adding 2FA and encryption to legacy systems already in the field.…
E
Error Code

1 EP 52: Hacking Cellular-Enabled IoT Devices 37:59
37:59
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé37:59
This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7 , describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.…
E
Error Code

1 EP 51: Hacking High-Performance Race Cars 43:39
43:39
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé43:39
When we think of IoT, we first think of our smart light bulbs, our smart TVs, our smart baby monitors. However, we don't typically associate IoT with high-performance race cars, and yet they collect terabytes of data each race. Austin Allen, Director of Solutions Architecture at Airlock Digital , discusses the growing presence of smart devices and the responsibility of securing them—should it be the developers who write the code, or the individuals who implement it?…
E
Error Code

1 EP 50: Keeping The Lights On In Ukraine 44:07
44:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé44:07
What would happen if your GPS signal were jammed? It would impact more than just navigation – you'd also lose access to financial data and power. Joe Marshall, Senior IoT Strategist and Threat Researcher at Cisco Talos , discusses an innovative solution to maintain the country's power grid operations in the event of GPS jamming, whether it's a precautionary measure or an act of war.…
E
Error Code

1 EP 49: Hacking Android-Based ICS Devices 39:27
39:27
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé39:27
Cybercriminal tactics against ICS include direct threats against individuals for MFA credentials, sometimes escalating to physical violence if they won’t share. Jim Coyle, US Public Sector CTO for Lookout , warns about the increasing use of Android in critical Industrial Control Systems (ICS), such as HVAC systems, and how stealing MFA tokens from mobile devices could affect critical services like healthcare, finance, and water supply, depending on the goals of the attackers.…
E
Error Code

1 EP 48: The New Insider Threat: Hacking Corporate Office Devices 40:51
40:51
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé40:51
If smart buildings are vulnerable to hacking, what about smart offices? Even devices like printers and lighting systems could give an attacker a way in. John Terrill, CSO at Phosphorus , recalls a moment while working at a hedge fund when he found himself in a room filled with priceless art. He realized that the security cameras safeguarding these artworks were operating on outdated software, potentially containing known vulnerabilities.…
Bienvenue sur Lecteur FM!
Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.