Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Car Cyber Security Podcasts

show episodes
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the Donald Trump administration, DOGE, Tesla, insurance costs, recession risks, egg shortages, DeepSeek, neo-Nazis, Putin and Xi, solar batteries, the jobs market, anti-Semitism, a ...
  continue reading
 
Loading …
show series
 
Since the assassination of Charlie Kirk, there’s been raging debate in the US about free speech. At a memorial for him in Arizona, President Trump described Mr Kirk as a ‘martyr for American freedom’ while simultaneously attacking the likes of talk show host Jimmy Kimmel, whose show was suspended last week over comments he made about Kirk’s death. …
  continue reading
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
Once praised for its simplicity and speed, Google search is now facing criticism for excessive advertising and frustrating search results. Today, 404 Media co-founder Emmanuel Maiberg, on what’s gone wrong with Google search, how it impacts everyday users, and what this means for the future of one of the internet’s most essential tools. Featured: E…
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
Donald Trump was in his element at a state dinner hosted by King Charles at Windsor Castle. But outside the grounds, protesters served as a reminder that controversy continues to follow the President, including lingering questions over his past ties to Jeffrey Epstein. As the UK weighs the diplomatic value of his visit, attention is also turning to…
  continue reading
 
ביטחון פיזי והגנת סייבר הם שני צדדים של אותה המטבע, כול אחד מהם מהווה השלמה של השני וחשוב למניעת מתקפה על הארגון. ארגונים שאינם ביטחוניים נוטים להפריד ביניהם ושוברים את קו ההגנה הרגיש ממילא נחשון פינקו מארח את אל"מ (מיל'), מייסד ומנכ"ל חברת פריבקסי מבכירי משרד ראש הממשלה לשעבר מקים וראש חטיבת הסייבר המבצעי של משרד הביטחון, ראש בית הספר לסייבר וטכנו…
  continue reading
 
Tyler Robinson, the 22 year-old suspect in the assassination of right-wing US political activist Charlie Kirk has been charged, including with aggravated murder. But while America is accustomed to political assassinations, the response since the shooting has been out of the ordinary. Today, long time US historian, Dan Carter on what’s unfolded sinc…
  continue reading
 
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
  continue reading
 
The government is set to release a new carbon emissions target, dumping the 2030 ambition for a new 2035 goal. But how much of the process is about the climate and how much is pure politics? Today, ABC finance expert Alan Kohler on this week’s dire climate risk assessment, and what our new target will really achieve. Featured: Alan Kohler, ABC Fina…
  continue reading
 
What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
A massive military parade in Beijing recently revealed just how advanced China’s weaponry has become. It even includes an intercontinental ballistic missile that could hit key military bases in Guam. So, what does this mean for Australia's military purchases and strategy? Today, ABC Global Affairs Editor Laura Tingle on why we might need a total re…
  continue reading
 
Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
  continue reading
 
One of the great things about owning an electric vehicle is that you’re not taxed for using the roads - those behind the wheel of other cars pay the fuel excise when they refill. But the government is looking to change that. Today, Giles Parkinson, founder and editor of Renew Economy and The Driven websites, on why a road user charge for electric v…
  continue reading
 
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
  continue reading
 
It was another act of political violence in a nation too accustomed to assassinations. Charlie Kirk, a 31-year-old right-wing political activist and staunch Trump supporter, was shot and killed while he addressed a crowd at Utah Valley University. Today, Geoff Kabaservice from the centre-right think tank the Niskanen Center on what unfolded, and wh…
  continue reading
 
שני סיסויים נכנסים לאולפן.....נשמע כמו התחלה של בדיחה טובה. הגנה על תשתיות קריטיות היא משימה מורכבת, האחריות מחד והצורך ללהטט בין הרגולציה להנהלה מאידך נחשון פינקו מארח את חיים הלוי סלע סיסו מוכר ומוערך באחת מחברות האנרגיה הגדולות בישראל לשיחת סיסויים על תחושת האחריות, ההתמודדות היום יומית עם סייבר בתקופת מלחמה, האם הרגולציה עוזרת או מפריעה, איך בו…
  continue reading
 
Donald Trump says he’s “not thrilled” following an Israeli attack on Doha, the capital of key US ally Qatar. The strike targeted Hamas "senior leadership", with five of its members killed alongside a Qatari internal security forces member. It’s clear the US was given very little notice before the attack unfolded - so will the US President do anythi…
  continue reading
 
With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
  continue reading
 
At 94, Rupert Murdoch has finally achieved his succession plan. The media mogul has secured a deal to have his son Lachlan take complete control of his empire once he dies, following a financial deal with his three older children, Prudence, Elisabeth and James. Today, journalist Paddy Manning, author of The Successor, the first unauthorised biograp…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
  continue reading
 
Erin Patterson, the so-called mushroom murderer, will spend at least the next 33 years in jail with parole a possibility but not a certainty when she’s 81 years old. As she sat in the courtroom the convicted triple murderer and mother of two showed no emotion, often with her eyes closed as Justice Christopher Beale handed down the life sentences. T…
  continue reading
 
America’s next mining venture could be deep below the sea’s surface, removing nodules on the seabed full of the metals vital for the green energy transition. Polymetallic nodules are like golf balls which sit more than four kilometres deep and haven’t been touched for millions of years. An Australian-born businessman is leading the push to extract …
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
Donald Trump’s been so busy upending the norms of democracy, igniting trade disputes and failing to end wars, it’s hard to see how he’s had time for renovations. But the US president’s real estate development roots are on full show, from splashing gold around the Oval Office, to ripping up the grass in the White House Rose Garden, he’s on a mission…
  continue reading
 
לראייתי כול קובץ שנכנס לארגון דורש בדיקה והלבנה, בעידן שמערכות הלבנה מסוגלות לבצע בדיקה ללא לייטנסי ומבלי לעכב את המשתמש כול קובץ צריך לעבור סניטציה. אחת ולתמיד מה ההבדל בין מערכת הלבנת קבצים לבין בדיקת וירוסים (נוזקות)? בתחילת הדרך המשמעות של הלבנה הייתה בדיקה של הקבצים ע"י מספר מנועי אנטי וירוס בד"כ 3-5 בו זמנית ו"הצבעה" ביניהם על תקינות הקובץ אם…
  continue reading
 
Every year tens of thousands of Australians turn to IVF to start or grow a family. But is it an industry that can be fully trusted given recent revelations of embryo and sperm mix-ups and women giving birth to strangers’ babies? Today, ABC journalist Grace Tobin on her latest investigation into one couple’s fraught experience and why the rules need…
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
Since the fanfare surrounding Donald Trump’s face to face peace talks with the Russian President, perhaps unsurprisingly, the war continues in Ukraine. That’s partly because as part of any deal, Vladimir Putin wants Ukraine to hand over the entire eastern region of Donbas. It’s a demand that Ukraine rejects. So, what is so important to Putin about …
  continue reading
 
Want to work in cybersecurity but don’t know where to begin? Or just curious what it takes to break into the field? This week, we’re joined by the internet’s very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background. 👩‍💻💼 In Crash C…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
  continue reading
 
It’s one man against the might of the Victorian police force as accused police killer Dezi Freeman remains on the run. On Monday, Victoria Police suggested someone might be helping the fugitive and they should contact police. So, how are police approaching the search and how long are they willing to keep it going? Today, Vince Hurley, a criminologi…
  continue reading
 
Could artificial intelligence be key to improving Australia’s living standards? A Productivity Commission report suggests the roll out of the technology could inject more than a hundred billion dollars into the economy over the next decade. But there’s a catch. If AI can take over from workers on some tasks, are swathes of humans set to lose their …
  continue reading
 
Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
For a long time to buy a home in Australia you needed a 20 per cent deposit or you’d have to pay a big lender's mortgage insurance fee. It’s asking a lot, given house prices in our major cities are around the million-dollar mark or more. This week, the government expanded a five per cent deposit scheme for first home buyers, with no income caps and…
  continue reading
 
אני יכול להגיד בביטחון שמרבית אנשי הסייבר שעוסקים במערכות תפעוליות מגיעים ממערכות המידע ולמדו את תחום הבקרה, ללא הבנה של תחום הבקרה לעומק ההגנות יהיו מתוך התפיסה של מערכות מידע טעות מוכרת של הרבה מנהלי מערכות מידע ומנהלי אבטחת מידע בסביבות תפעוליות. משב רוח מרענן הם אנשי בקרה שנכנסו גם לתחום הסייבר, במסגרת המסע שלי למציאת פתרונות גישה מאובטחת מרחוק…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
Victorian police officers had gone to execute a search warrant on a Wednesday morning in a sleepy alpine village. But the day turned to tragedy with self-identified ‘sovereign citizen’ Dezi Freeman allegedly killing two of the officers and wounding another. Today, Four Corners reporter Mahmood Fazal who recently spent months investigating the movem…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
The spy agency ASIO has revealed Iran orchestrated at least two antisemitic attacks in Australia last year and now all ties with Tehran have been cut. The attacks in Sydney and Melbourne terrified the Jewish community and were aimed at undermining social cohesion. Now the Iranian ambassador has been expelled and Australian diplomatic staff have qui…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play