This is a story about how organizations are moving their SCADA systems to the cloud and how they need to secure them or they’ll be attacked. Chris Doman, co-founder and CTO of Cado Security discusses…
Category: Episode
If you knock down an email server, you could stand up a parallel server or you could find workarounds. If you knock down a factory floor, there is no real parallel, alternative to a factory…
One of the problems with security is ROI. If I put in next gen this and next gen that and no security events happen, am I justified in making those expenditures? How do you quantify…
This is the story of how a researcher turns commercial and commonly used EDRs and Cloud-based backup systems into wipers against the very data they’re designed to protect. Or Yair, security research team lead at…
Could ChatGPT be used to perform side channel attacks on real hardware? Witold Waligora, CEO of CloudVA, talks about his Black Hat Europe 2023 presentation that shows how and when it can be used in…
You might think that internet-connected cameras would be limited in use by a bad actor. Actually such devices can be an entry point into an organization, providing yet another means of accessing the internal network.…
There’s a fake news report about three million internet-enabled toothbrushes contributing to a botnet. Unfortunately the mainstream media ran with the story before questioning its basic assumptions. This is a story about IoT devices and…
Ransomware groups have bifurcated with doing pure ransomware and others going straight to extortion; it’s whether the data is ransomed on your network or theirs. Nick Biasini from Cisco Talos talks about the threats he’s…
The Purdue Model used in OT is essentially network security from the 1990s. New threats and new tech however required us to rethink that on the network side so how do we bring that new…