Critical Infrastructure: Everything is Connected and Vulnerable

Critical Infrastructure: Everything is Connected and Vulnerable

When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity's most critical blind spots: industrial control systems that keep society running but remain dangerously exposed. What You'll Learn: Why industrial control systems can't be updated like your laptop—and what that means for secu...

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(92)

Cyber News: Iranian Hacker, Quantum Ransomware and Rogue AI

Cyber News: Iranian Hacker, Quantum Ransomware and Rogue AI

What would you do if ransomware told you not only that your data was gone — but that it was encrypted with a quantum-safe algorithm and you have 72 hours to pay? That's not a hypothetical anymore. In...

18 Mai 42min

Inside Email Security: Phishing, Hackers, and Harmony Checkpoint

Inside Email Security: Phishing, Hackers, and Harmony Checkpoint

Most organizations think they're protected. They're not. Microsoft Defender sounds solid on paper — but in the real world, it's letting phishing, malware, and business email compromise walk right thro...

4 Mai 32min

Ghost in the Machine: AI Identities & the Spiritual Red Teaming

Ghost in the Machine: AI Identities & the Spiritual Red Teaming

Your organization may have hundreds of AI agents running right now that your security team doesn't know exist. Every single one is an identity. Every identity is an attack surface. In this episode of...

20 Apr 40min

Cyber News: Iran Attacks, Greyware, and Backdoor Code

Cyber News: Iran Attacks, Greyware, and Backdoor Code

What if the tools protecting your organization were the ones compromising it? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem — joined by IT Audit Labs team member S...

6 Apr 34min

Cognitive Surrender: How AI Weaponizes Human Psychology

Cognitive Surrender: How AI Weaponizes Human Psychology

A $25 million wire transfer. A fake CFO. An entire executive team that didn't exist. This is what modern cybercrime looks like — and your firewall won't stop it. In this episode of The Audit, co-host...

23 Mar 43min

Surviving a Cardiac Event: Biometric Data and the Risks Nobody Talks About

Surviving a Cardiac Event: Biometric Data and the Risks Nobody Talks About

What if the device keeping you alive was also a cybersecurity vulnerability? That's not a hypothetical — it's Victor Barge's reality. In this episode of The Audit, IT Audit Labs' Global Delivery Dire...

9 Mar 36min

Secret Service Agent Reveals Undercover Cyber Ops

Secret Service Agent Reveals Undercover Cyber Ops

What does it take to go undercover with international cybercriminals — with no backup, no safe house, and no script? In this episode of The Audit, Richard LaTulip, Field CISO at Recorded Future and fo...

23 Feb 44min

Cyber News: Advanced Phishing, ClickFix & AI Wearables

Cyber News: Advanced Phishing, ClickFix & AI Wearables

Microsoft dominates 22% of all phishing attacks, a $800 tool tricks 60% of victims into self-hacking, and Apple's planning a surveillance pin that records everything—welcome to 2025's cybersecurity ni...

9 Feb 33min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
teknisk-sett
tomprat-med-gunnar-tjomlid
energi-og-klima
teknologi-og-mennesker
shifter
nasjonal-sikkerhetsmyndighet-nsm
elektropodden
rss-heis
rss-for-alarmen-gar
rss-ai-forklart
smart-forklart
hans-petter-og-co
fornybaren
pedagogisk-intelligens
rss-vi-leser-dommer-om-personvern
rss-alt-vi-kan
rss-a-entelios-poden
rss-trippel-bunnlinje