As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
EE Journal's Amelia Dalton breaks down each week's EE news in an informative, fun and engaging style.
…
continue reading
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
…
continue reading
Information and commentary on all things IT.
…
continue reading
Computer America is the Nation's Longest Running, Nationally Syndicated Radio Talk Show about Computers and Technology!
…
continue reading

1
Automotive HPC Security Challenges and Solutions - Ep 22
22:14
22:14
Play later
Play later
Lists
Like
Liked
22:14With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant sing…
…
continue reading

1
How Are Shifting Priorities Impacting National Security in America?
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18Most Americans would agree that the United States should be protected, but from whom … and how? Dr. Donell Harvin, the former Chief of Homeland Security and Intelligence for the District of Columbia, says the U.S. is taking its eye off the ball - focusing its large domestic intelligence apparatus in a direction that is politically expedient, but no…
…
continue reading

1
Episode 212 - CISA updates, taxing IT professionals, and standing by generative AI
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome to Episode 212 At 212 degrees fahrenheit, water becomes steam. At 211 it’s hot. At 212 you can move a locomotive or make electricity. We are happy to bring you episode 212 of the Killing IT Podcast! Please share this podcast on Apple, iHeart, or wherever you listen. Sponsored by… The Small Biz Thoughts Technology Community. The best deal in…
…
continue reading

1
RTOSX to the Rescue: The Original Authors of THREADX (and Middleware) are Here to Help!
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05My podcast guest this week is Bill Lamie, CEO of PX5 RTOS and RTOSX. Bill and I chat about the motivation behind the creation of RTOSX, the long term support offered by RTOSX and why experts in the embedded field including the original authors of the ThreadX embedded real-time operating system are crucial to their success. Also this week, I investi…
…
continue reading

1
Sharing Intelligence: Challenges between US and Ukraine
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56After Russia’s full scale invasion of Ukraine, the U.S. rushed to create a secret center that set targets for the Ukrainians to destroy. But the counteroffensive of 2023 failed to achieve its goals. So, what went wrong? New York Times reporter Adam Entous spent more than a year reporting on this story. He joins SpyCast host Sasha Ingber to talk abo…
…
continue reading

1
How MathWorks is Solving the Challenges of Battery Management System Development with Modeling and Simulation
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Battery management takes center stage in this week’s Fish Fry podcast! My guest is Danielle Chu from MathWorks. Danielle and I explore the primary functions of battery management systems and the common challenges faced by engineers when designing electric vehicle battery management systems. We also investigate the role that modeling and simulation …
…
continue reading
Conflict has been escalating between two nuclear powers–India and Pakistan. It started in April, after India blamed Pakistan for supporting militants who carried out a massacre in Kashmir. President Trump offered to help defuse the tensions.Throughout history, India and Pakistan’s hostility has been documented in the President's Daily Brief, a high…
…
continue reading

1
Headed to the Skies! High Speed Data Transmission for Aerospace Designs
17:32
17:32
Play later
Play later
Lists
Like
Liked
17:32This week’s podcast is all about high speed data transmission in aerospace applications! My podcast guests this week are Christian Hobmaier and Thomas Mittermeier from ODU connectors. Christian, Thomas and I explore the biggest challenges in this arena, the innovative new connector solutions ODU offers to support these kinds of designs, and the det…
…
continue reading
In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security…
…
continue reading
They were a spy cell like no other — operating from quiet British suburbs, hailing from Bulgaria, and working on behalf of Russia. Their handler dubbed them “The Minions,” and their plots stretched across Europe and spanned honeytraps, abductions, and murder. At the time of this recording, six have been convicted and await sentencing. To parse out …
…
continue reading

1
A Transition to Software Defined Vehicles - AMD is Enabling the Next Generation of Smart Cars
17:17
17:17
Play later
Play later
Lists
Like
Liked
17:17My podcast guest this week is Wayne Lyons, Automotive Director at AMD. Wayne and I discuss the trends encouraging the development of software defined vehicles, how AMD is furthering innovation in many different areas within automotive design and the trends Wayne sees sharing the future of automotive technology.…
…
continue reading

1
Escalation: Tracking the US-Ukraine Relationship
40:43
40:43
Play later
Play later
Lists
Like
Liked
40:43The United States and Ukraine have had a long, complicated history that has been defined by just as much partnership and collaboration as hesitation and disagreement. This dynamic is laid bare in the 7-part podcast series ‘Escalation,’ produced by our partners at Goat Rodeo, with the national security publication Lawfare. In April 2025, The Interna…
…
continue reading

1
Embedded Software Academy: How Beningo is Educating the Next Generation of Embedded Developers
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42Embedded Software is the name of the game this week my friends! My podcast guest is Jacob Beningo of the Beningo Embedded Group. Jacob and I chat about what the three elements of embedded software Jacob believes everyone should know and how each of these elements can affect development. We also explore what motivated Jacob to develop the Embedded S…
…
continue reading
Why does Vladimir Putin often say that the West is conspiring to weaken Russia? Historian James Crossland traces this narrative back to a British intelligence officer and a failed assassination attempt on Vladimir Lenin in 1918. The story is featured in his new book, Rogue Agent, from Secret Plots to Psychological Warfare, the Untold Story of Rober…
…
continue reading

1
Inside the Truck Cyber Threat – PlaxidityX Ep 21
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
…
continue reading

1
Programmable PMICs and Cutting Edge Power Management with AnDAPT
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04This week my podcast guest is Giovanni Garcea, President of AnDAPT. Giovanni and I discuss the details of AnDAPT’s field programmable PMIC and how engineers can take advantage of AnDAPT’s programmable power solution that it designed with AI called PMIC.AI. Also this week, I check out a new fluid battery that can take any shape developed by research…
…
continue reading

1
Autonomous ships, cyber security and the workboat code
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
…
continue reading

1
DOGE Layoffs and the Counterintelligence Threats They Pose
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22Government employees were dismissed with startling swiftness and sweeping in the midst of the Trump administration's relentless pursuit to pare down the federal workforce. The sheer number of fired personnel and the manner in which US officials let them go have led to concerns that disillusioned former employees may share what they know with foreig…
…
continue reading

1
Concurrent Technologies Ushers In the Next Generation of Mission-Critical Applications
21:38
21:38
Play later
Play later
Lists
Like
Liked
21:38My podcast guests this week are longtime friend of the show Nigel Forrester and Victoria Middleton from Concurrent Technologies. Nigel, Victoria and I chat about the importance of rigorous testing in mission-critical systems, the details of Concurrent’s mission-critical embedded computing solutions, and how Concurrent can help engineers determine w…
…
continue reading

1
Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
…
continue reading

1
Taiwan: China’s Testing Ground for Intelligence Operations
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11It's no secret that China has recently stepped up political and military pressure on the democratically governed island of Taiwan. But then, there are the Chinese Communist Party's covert efforts: Recruiting from the inside, gathering intelligence, and exerting influence. Executive Director of the Global Taiwan Institute Russell Hsiao breaks down B…
…
continue reading

1
Secure-by-Design, Secure-by-Default: How SpiderOak is Protecting Data at the Edge
14:57
14:57
Play later
Play later
Lists
Like
Liked
14:57This week we are talking all about edge cyber security with David Pearah, CEO of SpiderOak. David and I explore why traditional cyber security solutions do not properly protect edge devices, how SpiderOak is empowering developers to protect their edge applications, and why they are also offering their technology platform as open source software.…
…
continue reading
Targeted uncovers harrowing stories of people who have been singled out and systematically dismantled—whether for political reasons, personal vendettas, or simply for being in the wrong place at the wrong time. Each episode deep dives into the tactics used against someone, the devastating consequences, and the remarkable lessons they’ve learned in …
…
continue reading

1
Understanding Chinese Espionage Through 900 Cases
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Nicholas Eftimiades’ 34 year career in government spanned the CIA, State Department and the Defense Intelligence Agency. He's published three books that examine the structure, methodology and operations of China's intelligence services. This, he says, led a Chinese communist newspaper to declare him an enemy of the state in the ‘90s. Now, Nick is r…
…
continue reading

1
Artificial Intelligence, Semiconductors and Inline Sensors: How imec is Transforming Biomanufacturing
16:58
16:58
Play later
Play later
Lists
Like
Liked
16:58Biomanufacturing takes center stage in this week’s podcast! My guest is Bert Verbruggen from imec. Bert and I explore the challenges of biomanufacturing and how inline production process monitoring can help solve these issues. Bert and I also discuss new inline sensor developments developed by imec and the value that artificial intelligence can bri…
…
continue reading
Sidney Gottlieb was one of the CIA’s star chemists during the Cold War. As head of MKUltra, he ran a brazen—and deadly—program aimed at mind control. Gottlieb and fellow scientists tried to keep the work secret by destroying files, but historian John Lisle has new details from the six boxes that remained untouched. He shares insights and reflection…
…
continue reading

1
New Insight and Awareness into IoT Security with Cyber Trust Mark
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38IoT security is the name of the game this week! My podcast guest is Sharon Hagi, Chief Security Officer of Silicon Labs. Sharon and I chat about the new cybersecurity labeling program called Cyber Trust Mark - the details of this program and the motivation behind its development. We also discuss the Connectivity Standards Alliance’s Product Securit…
…
continue reading

1
From Covert to Overt: Valerie Plame on political retaliation
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58Valerie Plame’s clandestine life made headlines in 2003 after her CIA cover was leaked to the press. Her husband, an ambassador, had gone to Niger to investigate whether yellowcake uranium had been transferred to Iraq to make weapons of mass destruction. He publicly challenged the Bush administration on what we now know was false intelligence. Vale…
…
continue reading

1
A Motion-Powered Revolution: WePower Energy Harvesting Technology
17:16
17:16
Play later
Play later
Lists
Like
Liked
17:16My podcast guest this week is WePower Founder/CEO Larry Richenstein! Larry and I chat about WePower’s innovative energy harvesting technology, the industries that could take advantage of this technology and the variety of products offered by WePower. Also this week, I investigate Forest 4.0 - a new intelligent forest data processing model that inco…
…
continue reading

1
Eyes on The Ground: The National Resistance Front in Afghanistan
31:25
31:25
Play later
Play later
Lists
Like
Liked
31:25After the Taliban took back control of Afghanistan, the National Resistance Front rose up to defy them. We spoke with their leader Ahmad Massoud, who has overseen hundreds of military and intelligence-gathering operations. He’s following the footsteps of his father, who led his own resistance group, the Northern Alliance, until members of Al Qaeda …
…
continue reading

1
Dynamic SBOM for Smarter Vehicle Security – PlaxidityX Ep 19
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
…
continue reading

1
Unlocking OEM Potential by Mastering Legacy Support: GDCA and Proactive Obsolescence Management
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51My guest this week is long-time friend of the show Ethan Plotkin, CEO of GDCA. Ethan and I chat all about proactive obsolescence management. We discuss the biggest challenges in terms of obsolescence for OEMS, the benefits of working with legacy equipment manufacturers and the ramifications of negative and positive case studies for obsolescence man…
…
continue reading

1
From NFL to Espionage: The Story of Ernest Cuneo
27:33
27:33
Play later
Play later
Lists
Like
Liked
27:33He was an American spy before an American spy agency existed. NFL player Ernest Cuneo, a little known first generation Italian American, worked with British intelligence to convince the United States to join World War II, and helped lay the groundwork for modern day espionage. Thomas Maier traces Cuneo’s extraordinary life in his new book, The Invi…
…
continue reading

1
The Next Steps Forward: How AI is Shaping Electronic Design
16:07
16:07
Play later
Play later
Lists
Like
Liked
16:07My podcast guest this week is Alex Iuorio from Avnet. Alex and I discuss Avnet’s recent Insights Survey including the motivation to create this survey, the skills needed to incorporate AI capabilities into our designs, and the AI related engineering concerns garnered from this survey. Also this week, I explore how mushrooms and coffee grounds can b…
…
continue reading
A fourth year of war in Ukraine begins. But for Lt. Col. Kyrylo Berkal, who’s been fighting since Russia first invaded in 2014, the battle for his country has raged much longer. Now, he’s second in command of the elite Third Assault Brigade, which has played a major role in critical battles against Russia and continues to develop new technologies t…
…
continue reading

1
Platform-Based Automotive Cybersecurity – PlaxidityX Ep 18
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles. We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability sc…
…
continue reading
We’re talking about test and measurement in this week’s Fish Fry podcast! My guest is Ritu Favre - President of Emerson Test & Measurement. Ritu and I explore the biggest trends in test and measurement today, the challenges of creating tests for systems newly incorporating AI into their designs, and what advice Ritu would give to engineers just sta…
…
continue reading