Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Love Pokemon? Enjoy a little ridiculousness now and then? Looking for a community in the world of Pokemon GO? Well, you've come to the right place! Your One-Stop Shop for tips, tricks, news, and fun in Pokemon GO! Where everyone has a seat at the table!
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
Welcome to The OT Life: A careers podcast from the OTs of Cygnet Health Care. We created The OT Life for OTs around the country who are interested in hearing from people who share the same passion for Occupational Therapy.We chat all things OT from our opinions about the profession, our role in health and social care, stories and experiences, and career advice.This is the place to help you make the most of the profession you love.https://join.cygnethealth.co.uk/ot-life/
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
Tune in to hear thought leaders discuss the latest trends and best practices for IT/OT convergence and industrial connectivity.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
In just 25 minutes, I deliver concise and thought-provoking conversations with top minds in technology, cybersecurity, business, culture and enterpreneurship. Whether you’re a technologist, executive, culture-enthusiast or someone passionate about growth, each episode explores trends, strategies and ideas that shape success. For those with limited time but unlimited ambition, 25Minutes offers actionable insights and fresh perspectives where they matter most. Your time is valuable. Your 25 mi ...
…
continue reading
A Broad array of topics in the technology space Informative, relevant, and engaging. Without the self-serving narrative. We aim to share industry best practices, drive awareness, and discuss what thought leaders share. Companies or manufacturers often only focus on their area of interest, which is short-sighted, limiting, and siloed. Our diversity and partner network offers substantial, informative value. Similar challenges and growth aspirations exist in the b2b and b2c space. This podcast ...
…
continue reading
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get ...
…
continue reading
Welcome to Audience 1st. A podcast for tech marketers looking to break out of the echo chamber to better understand their audience and turn them into loyal customers. Every week, Dani Woolf is having brutally honest conversations with busy tech buyers about what really motivates them, the things they hate that vendors do, and what you can do about it. You’ll get access to practical information on how to build authentic relationships with your audience, listen to and talk with your buyers, an ...
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
Welcome to the Methods podcast! Methods are the UK’s leading independent transformation partner for public services. We apply our skills in innovation and collaboration from across the Methods Group, to deliver end-to-end business and technical solutions that are people-centered, safe, and designed for the future. You can find out more about the Methods group at www.methods.co.uk.
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
Brent Gunning and former Toronto Maple Leafs GM Gord Stellick provide the most insightful Maple Leafs pre- and post-game show with Leafs Nation.
…
continue reading
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
Royal College of Occupational Therapists is the professional membership body for occupational therapy staff in the UK. This is the home for our podcast series. www.rcot.co.uk/podcasts
…
continue reading
Dave Kittle, DPT of www.CashBasedPhysicalTherapy.org discuss Physical Therapy and Technology in this podcast. Full VIDEO versions of each episode can be found at https://www.youtube.com/PTTechTalk Dave Kittle also owns www.ConciergePainRelief.com (Home Physical Therapy) serving New York City, Long Island, NJ, and CT.
…
continue reading
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
…
continue reading

1
Bridging IT/OT & Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51Dino welcomes Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo to this episode. They discuss the growing challenges and evolving strategies around cybersecurity in industrial environments. Kevin shares a seasoned perspective on bridging the gap between IT and OT, busting myths about Zero Trust certifications, and the dangers of underutilized …
…
continue reading

1
From CISO to Startup: OT Security, Leadership, and Lessons from the Field
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04In this episode of the Critical Assets Podcast, Patrick Miller interviews Darren Highfill, former CISO of Norfolk Southern, for a candid look behind the curtain of life as a security executive. Darren shares hard-won lessons from building and leading a cybersecurity program in a critical infrastructure environment, including how to gain executive b…
…
continue reading

1
HN779: Do We Really Need the Modern Networking Stack?
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
…
continue reading

1
Liora Shimoni former Deputy Dir. @state Comptroller Audit Division on cyber auditing
43:53
43:53
Play later
Play later
Lists
Like
Liked
43:53משרד מבקר המדינה הוא גוף הביקורת הגדול בישראל עם כמות עצומה של נושאים בהם הוא נדרש לטפל. נושא הסייבר הפך להיות נושא מהותי לאור אין ספור המתקפות כנגד גופי מדינה והניסיון להשבית מערכות של גופי ממשל, בריאות, ביטחון ועוד. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את ליאורה שמעוני לשעבר סגנית מבקר המדינה ומ…
…
continue reading

1
Confronting China’s Expanding Cyber Threats
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of moder…
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading
This episode is pretty FOWL. lol Get it? Fowl? Please laugh.
…
continue reading

1
Christiaan Beek on Ransomware's Evolution and Economics
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware's viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. I…
…
continue reading
Zero Trust is a security model based on default-deny policies and fine-grained access control governed by identity, authentication, and contextual signals. For RSAC 2025, John Kindervag, Chief Evangelist of Illumio and the creator of Zero Trust, talks about introducing a "protect surface" into legacy OT systems —isolating critical data, application…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading
Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021. Learn more about your ad choices. Visit me…
…
continue reading

1
S3 E4: Breaking Barriers in Cybersecurity with Eddie Miro
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Josh Mason and Wade Wells bring us an exciting episode of Simply Defensive, featuring special guest Eddie Miro. Eddie shares his journey in cybersecurity, offering insights into his experiences at DEFCON, the creation of Octopus Game, and his mission to make cybersecurity more inclusive. Join us as we delve into the benefits of Capture the Flag (CT…
…
continue reading

1
RCR 160: Physical Meets Digital: Security's Evolving Frontier - Vendor Focus (Haystack.com)
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data…
…
continue reading
The bunny trails were REAL this episode! Enjoy!
…
continue reading

1
Know Before You Go: The Empathy Codified Playbook for RSA Conference 2025
59:49
59:49
Play later
Play later
Lists
Like
Liked
59:49Most vendors won’t admit this, but we will: Your brand doesn’t have a messaging problem. It has a presence problem. And it’s why buyers leave RSA feeling numb, unseen, and unready to trust you. In this episode, Dani Woolf sits down with Zachary Hyde, someone she doesn’t always agree with, which makes this conversation one of the most honest and urg…
…
continue reading

1
Why Ransomware, Credential Theft and Phishing Schemes Persist
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best …
…
continue reading

1
HN778: Understanding Model Context Protocol (MCP) with Selector (Sponsored)
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Model Context Protocol (MCP) is a very new protocol that provides a standard way to link AI models to a variety of data sources and tools. As the industry heads toward agentic AI–in which an AI agent interacts with disparate applications, data sources, and other agents to achieve a task–MCP provides the protocol glue. On... Read more »…
…
continue reading

1
Cyber Threats, China, and the Global Wake-Up Call
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Dino and Craig address the recent acknowledgment by China of their role in U.S. infrastructure hacks. They explore the urgent cybersecurity challenges facing industrial environments. With rising geopolitical tensions, tariffs, the push to bring more manufacturing back to the U.S. and increasing attacks on critical infrastructure, the stakes have ne…
…
continue reading

1
Privacy and Data Protection in the Age of Big Data
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43In this episode of Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Dan explains how businesses can build trust by aligning technical operations with legal obligations—what he calls “say w…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
Orit Benvenisti partner & CEO @Tigbur Group about how to build cyber culture & "raise the walls"
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12לאורך כל הריאיון היה ברור שמדובר בזן אחר של מנכ"ל עם גישה שונה, ניהול חברה המעסיקה עשרות אלפי מועסקים, כ-700 עובדי מנהלה ב-40 סניפים מחד, והרצון להבין מאידך, יוצרים תמהיל לא פשוט לכול הנהלה והעומדת בראשה. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את אורית בנבנישתי שותפה ומנכ"ל קבוצת תיגבור בשיחה על ראי…
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading

1
S3 E3: Unlocking the Secrets of OPSEC - A Deep Dive with Mitch Cohen
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Mitch Cohen, privacy and OPSEC expert from flare.io. Mitch shares his journey to becoming a 'digital ghost' and offers valuable insights into operational security (OPSEC) and privacy practices. He discusses the importance of securing personal information, the risks associa…
…
continue reading

1
E38 – Stop Shadow IT with one easy trick!
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Shadow IT: Identifying and Managing Unauthorized Technology Use In this episode of 'Off the Wire,' Tanner and Anthony discuss 'Shadow IT' and its implications on organizational security and efficiency. They delve into concrete examples, such as unauthorized software subscriptions and unapproved hardware purchases. Tanner and Anthony provide insight…
…
continue reading

1
What Cybersecurity Leaders Must Learn from OT Practitioners in Underserved Critical Infrastructure
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37In this episode of Audience 1st Podcast, Dani sits down with Kristin Demoranville, CEO of Anzen Sage and host of the Bites & Bytes podcast, to uncover the hidden vulnerabilities in one of the world’s most overlooked critical infrastructure sectors: food and agriculture. From insider threats in peanut processing to cyber attacks that disrupt egg sup…
…
continue reading
Today’s Heavy Networking is all about overlay technologies, their history, development, and current state, both from engineer and vendor perspectives. We discuss why the industry turns to overlays to solve problems, and look at overlay and segmentation approaches including VXLAN, SRv6, and EVPN. We also drill into the idea that EVPN could become th…
…
continue reading

1
How Do Security Teams Keep AI from Becoming a UX Nightmare?
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08AI is transforming cybersecurity at a rapid pace, but how do we ensure security without compromising usability? In this episode of Threat Vector, host David Moulton sits down with Christopher DeBrunner, VP of Security Operations at CBTS, and Ryan Hamrick, Manager of Security Consulting Services. They explore how AI-driven security is improving thre…
…
continue reading
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
…
continue reading

1
Autonomous ships, cyber security and the workboat code
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
…
continue reading

1
Insecure Webcam Was All a Ransomware Group Needed
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53Endpoint security tools worked, but the hackers worked harder for their payday. While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simulta…
…
continue reading
Solar power systems are rapidly becoming essential elements of power grids throughout the world, especially in the US and EU. However, cybersecurity for these systems is often an afterthought, creating a growing risk to grid stability and availability. Daniel de Santos, Head of Research at Forescout, talks about his recent research into vulnerabili…
…
continue reading

1
IoT Meetup #4: Mati Epstein Head of IoT & ICS Tech Sales @Checkpoint on IoT Security and Enforcement
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17האם מכשירי האיי.או.טי שלך מאובטחים? אכיפה אוטומטית עם למידת מכונה מרצה: מתי אפשטיין, ראש מכירות טכנולוגיות האיי.או.טי ואיי.סי.אס , צ'ק פוינט ההרצאה זו מתמקדת באבטחת "מכשירים מחוברים" - אכיפה! בהנחה שמכשירי האיי.או.טי ואיי.סי.אס פגיעים, קלים לפריצה ומקור לתנועה רוחבית זדונית ברשתות איי.טי ואוו.טי, צ'ק פוינט יוצרת באופן אוטונומי (ואוטומטי) מדיניות אב…
…
continue reading

1
Prevention through design: Enhancing workforce safety with a Digital Twin (Featuring Amazon)
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11In this episode, we speak with Amazon, one of the original AWS customers. Our guest, Shreya Hegde, Sr. Product Manager in Reliability Maintenance Engineering at Amazon, guides us through her experience working with AWS and its partners with a focus on utilizing AWS IoT TwinMaker to proactively address safety in design.…
…
continue reading

1
Zero Trust in OT: A Look Back at Lessons Across IT and OT
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29In this special rewind episode, Dino Busalachi and Jim Cook address the messy but critical reality of implementing Zero Trust in operational technology (OT) environments. Drawing from years of hands-on experience, they break down why traditional IT frameworks often fail on the plant floor, especially when facing flat OT networks, legacy assets, and…
…
continue reading

1
Identity, AI, and the Unseen Threats in Healthcare Cybersecurity – with vCISO Jason Taule
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51Healthcare IoT systems are increasingly targeted by cyber threats, necessitating a shift in strategy from isolated, organization-specific responses to a collaborative, ecosystem-wide approach. James McCarthy sits down with vCISO and 30-year information assurance and cybersecurity veteran Jason Taule. Taule brings important insights into the challen…
…
continue reading