This is the story of how the security of OT devices in the field can be modernized virtual isolation in the cloud, adding both authentication and encryption into the mix. Bill Moore, founder and CEO…
Category: Episode
This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a…
When we think of IoT, we first think of our smart light bulbs, our smart TVs, our smart baby monitors. However, we don’t typically associate IoT with high-performance race cars, and yet they collect terabytes…
What would happen if your GPS signal were jammed? It would impact more than just navigation – you’d also lose access to financial data and power. Joe Marshall, Senior IoT Strategist and Threat Researcher at…
Cybercriminal tactics against ICS include direct threats against individuals for MFA credentials, sometimes escalating to violence if they won’t share. Jim Coyle, US Public Sector CTO for Lookout, warns about the increasing use of hacking…
If smart buildings are vulnerable to hacking, what about smart offices? Even devices like printers and lighting systems could give an attacker a way in. John Terrell, CSO at Phosphorus, recalls a moment while working…
If you are in IT, you are probably not thinking about the risks associated with the Otis Elevator or the Coke machine. Maybe you should. Chester Wisnieski, the director and global field CTO at Sophos,…
Political hacktivism once mainly focused on website defacement. Now it has shifted to targeting physical devices, affecting critical infrastructure such as water treatment plants. At Black Hat USA 2024, Noam Moshe from Claroty highlighted how…
What if you could build your own embedded security tools, glitching devices for a fraction of the cost that you might expect. Like having a $150,000 laser setup for less than $500. A talk at…