Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Critical Infrastructure Security Podcasts

show episodes
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork
 
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
  continue reading
 
Artwork

1
The Watchers

Sentinel Blue

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
  continue reading
 
Catch up on the biggest stories of the day from Washington with interviews and analysis from leading journalists. Posted weekdays at 6:30 pm ET. From C-SPAN, the network that brings you the "Q&A" podcast.
  continue reading
 
We talk about the latest diplomatic strategies, next-generation critical infrastructure technologies, and trade missions throughout the United States, Europe, Southeast Asia, and Latin America.The Embassy Row Project was founded by international energy and infrastructure technology advisor, James Scott. ERP strives to unify the next generation of leaders & initiatives that are hyper-focused on instigating positive change on issues that impact the environment, human rights, technological inno ...
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
ISNR is the only event in Europe that allows you to network and do business with high security end users and sector professionals. ISNR brings together government, public sector, police and emergency response, transport and critical national infrastructure stakeholders with commercial and private security organisations. This focused event delivers a unique opportunity to learn from a comprehensive seminar program and high-level, industry leading conference. Showcasing the complete range of t ...
  continue reading
 
Artwork

1
OCA Community Connect

Roseann Guttierrez

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
  continue reading
 
Artwork

1
Everyday Heroes

Hayden Baillio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
  continue reading
 
Artwork

1
Civil Defense Radio

Civil Defense Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Civil Defense Radio – bringing you news, commentary, and the views of subject matter experts on what is happening in the emergency preparedness, community resiliency and critical infrastructure protection movement.
  continue reading
 
Artwork

1
AI Realized

Christina Ellwood and David Yakobovitch

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
AI Realized Podcast Join hosts Christina Ellwood and David Yakobovitch as they dive deep into the cutting-edge world of enterprise AI deployment. Drawing inspiration from the annual AI Realized Summit, this podcast brings you the insights, strategies, and real-world experiences of Fortune 2000 leaders who are reshaping their organizations through AI. Each episode of AI Realized tackles the most pressing challenges and opportunities in AI implementation: Discover how industry giants like Bank ...
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork
 
Tough Tech Vets is a podcast series focused on veteran entrepreneurs solving hard problems at the intersection of hardware and software. Hosted by Chris Ricks, a former Naval Submarine Officer and Founder of Starcube, a small modular reactor company that’s focused on building microreactors for critical infrastructure. While there’s a lot of education around traditional startups for veterans, the Touch Tech landscape is a lot less clear. Whether you’re currently building a tough tech product ...
  continue reading
 
Artwork

1
RealTiME Live!

Society of American Military Engineers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Society of American Military Engineers leads collaborative efforts to identify and resolve national security infrastructure-related challenges. Founded in 1920, SAME unites public and private sector individuals and organizations from across the architecture, engineering, construction, environmental and facility management, cyber security, project planning, contracting and acquisition, and related disciplines in support of national security. Headquartered in Alexandria, Va., SAME provides ...
  continue reading
 
Building better software, one incident at a time. Host Kevin Riggle talks with software engineers about that time they broke production. Whether you're an industry professional, or just curious about what makes the modern Internet run and what happens when it breaks, we bring you stories you haven't heard elsewhere. This is the audio version of the podcast. Watch on YouTube: https://youtube.com/@critical-point Produced by Complex Systems Group (https://complexsystems.group). Part of Critical ...
  continue reading
 
Artwork

1
CvCISO Podcast

SecurityStudio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
  continue reading
 
Artwork

1
The New CISO

Steve Moore

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
Artwork
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Astonishing growth. Resiliency. Quantum security. Imagine what could happen when “The data center strikes back?”... Join us global innovation leaders Kyndryl and Nokia for our new three-part podcast series as we explore the industry trends, customer use cases and game-changing technology solutions set to rock your data center’s world. In each episode, Peter Nass, an offering Manager from Kyndryl, will be joined by experts from Kyndryl and Nokia – two of today’s global leaders in technology, ...
  continue reading
 
Artwork

1
Over The Edge

Caspian Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
  continue reading
 
Artwork

1
PublicPowerX

American Public Power Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
PublicPowerX is the new podcast from the American Public Power Association where key vendors and service providers explain their role in keeping public power safe, reliable, and secure. Subscribe to this feed to get these stories from public power’s service providers as they become available. If you are a company that does business with public power utilities and would like to host an episode of Public Power X, go to publicpower.org/podcasts to learn more.
  continue reading
 
Artwork

4
Tech in Translation

Iron Bow Technologies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Tech in Translation, the podcast where we break down the complexities of today's most innovative technologies into something we can all understand. Brought to you by Iron Bow Technologies, a next-generation solutions provider, we're committed to helping our customers across the government, education, commercial, and healthcare sectors turn their tech challenges into real, actionable outcomes. At Iron Bow, we believe that technology should be a tool for empowerment, not a source of ...
  continue reading
 
Artwork

1
The Jedburgh Podcast

Fran Racioppi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Jedburgh Podcast empowers leaders to achieve success on their journey to transform themselves and their organizations. Creator, Host and Special Forces Green Beret Fran Racioppi interviews the world’s most prominent visionaries, drivers of change, and those dedicated to winning. Each episode is an in-depth discussion with trailblazers who’ve earned success through a dedication to talent development, preparation, introspection, and the drive to get things done. Our conversation will empow ...
  continue reading
 
CEO Stories is a podcast series that delves into the stories behind some of the Greater Birmingham region's leading or up-and-coming CEOs. The series is hosted by Henrietta Brealey, who in 2021 became the youngest CEO in the Greater Birmingham Chambers of Commerce's 208-year history. Listen to find out what makes some of the region's finest leaders tick, who inspired them and what advice they would offer to aspiring CEOs. Greater Birmingham Chambers of Commerce is the West Midlands' leading ...
  continue reading
 
Artwork

1
Adopting Zero Trust

Adopting Zero Trust

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
  continue reading
 
Artwork

1
Bits and Bytes by Byteworks

Matthew P. Scott and Joey Wenzler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A Broad array of topics in the technology space Informative, relevant, and engaging. Without the self-serving narrative. We aim to share industry best practices, drive awareness, and discuss what thought leaders share. Companies or manufacturers often only focus on their area of interest, which is short-sighted, limiting, and siloed. Our diversity and partner network offers substantial, informative value. Similar challenges and growth aspirations exist in the b2b and b2c space. This podcast ...
  continue reading
 
Artwork

1
Fintech Beat

Chris Brummer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Fintech Beat, the intersection of finance, technology, policy and regulation. Each episode features the latest trends, movers and shakers, ideas and policies in financial technology. Host Chris Brummer, a Georgetown law professor and world-renowned fintech expert, partners with the CQ Roll Call newsroom — Washington's leader for nonpartisan legislative and regulatory analysis — to bring insights that make this a must listen for anyone interested in finance.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Hospitality Property School Podcast is written and produced by travel authorities that have come together with decades of hotel, resort, inn and bed & breakfast visitation experience. We have spent thousands of hotel nights in properties of all sizes and classes worldwide, conducting countless site inspections for a number of world-class tour and travel companies, as well as receiving feedback from 100,000s of customers. This knowledge has given us a unique insight into the wants, needs and ...
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Loading …
show series
 
In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
  continue reading
 
In a powerful reminder that hardware security is just as critical as software defense, Cisco Talos researchers have uncovered “ReVault,” a collection of five high-severity firmware vulnerabilities in Dell’s ControlVault3 subsystem. These flaws impact over 100 Dell laptop models, including the Latitude, Precision, and XPS series—devices used widely …
  continue reading
 
President Donald Trump announces he is nominating Stephen Miran, current chair of the Council of Economic Advisers, to Federal Reserve Board, to replace a board member who has resigned; Wall Street Journal's Gavin Bade on first day with President Donald Trump's tariffs in effect on more than 90 countries (6); Sen. John Cornyn (R-TX) says FBI has ag…
  continue reading
 
The aviation industry has suffered yet another major cybersecurity incident. Air France and KLM have confirmed a data breach impacting customer records via an external customer service platform. While no sensitive financial or identity documents were compromised, attackers successfully accessed unspecified customer data—prompting both airlines to n…
  continue reading
 
A new report reveals that 75% of European companies depend on US tech giants like Microsoft and Google for core services. Former US Cyber Command contractor Kevin Michelizzi explains how decades of underinvestment have made Europe digitally dependent and now it’s paying the price. Meanwhile, Russia raises the alarm on widespread cybercrime through …
  continue reading
 
Enterprise secrets managers—long considered the most secure components in modern infrastructure—are now under fire. In a groundbreaking report, cybersecurity firm Cyata revealed 14 critical zero-day vulnerabilities across CyberArk Conjur and HashiCorp Vault, exposing flaws that allow unauthenticated attackers to achieve remote code execution (RCE),…
  continue reading
 
In this episode of Lumumba’s Africa, we delve into the dynamic world of African telecommunications, where multinational giants dominate the market, shaping economies, politics, and daily life across the continent. These telecom behemoths are more than just service providers — they are gatekeepers of information, influencers of policy, and key drive…
  continue reading
 
In this episode of Lumumba’s Africa, professor P.L.O. Lumumba examines the sanctions that were once imposed on South Africa and their far-reaching consequences. We look at the motivations behind the punitive measures — from trade restrictions to financial blacklisting — and ask: were these sanctions a legitimate response to policy disagreements, or…
  continue reading
 
Enterprise AI assistants are revolutionizing productivity—but they’re also opening new doors for cyberattacks. In this episode, we explore explosive research from Zenity Labs, which reveals that leading AI tools like ChatGPT, Microsoft Copilot, Google Gemini, Cursor, and Salesforce Einstein are vulnerable to prompt injection attacks—a class of expl…
  continue reading
 
A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters group—tracked internally by Google as UNC6040/UNC6240—**has launched a coordinated series of breaches using vishing (voice phishing) to compromise employee credentials, exfiltrate sensitive customer data, and dema…
  continue reading
 
Five soldiers are shot and wounded at Fort Stewart in Georgia… the suspected shooter, an Army Sergeant, is in custody; Texas Senate Committee on Congressional redistricting meets on the proposedRepublican-drawn district lines map designed to win Republicans five more U.S. House seats, while Texas House Democrats continue to remain out-of-state to k…
  continue reading
 
Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party CRM system. Detected on July 24, 2025, the breach compromised basic user details such as names, emails, and phone numbers of Cisco.com registrants. While the data was non-sensitive, the incident unders…
  continue reading
 
כשאתם נכנסים לרכב שלכם כמה מחשבה אתם מקדישים לעובדה שאתם בתוך דאטה-סנטר עצום, איך מתמודדים בטיחותית וסייברית עם מפעל שיש בו עשרות רבות ולעיתים מאות מחשבים עם שתי רשתות תקשורת שלפחות אחת מוגדרת כקריטית וכול זה ממוזער ונדחס לרכב אחד אין ספק שבטיחות והגנת סייבר בתעשיית הרכב היא אחד האתגרים הקשיים שיש החל משלב התכנון, דרך שרשרת אספקה ועד הרכב עצמו. נחש…
  continue reading
 
The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Security has launched Agent Ox, a groundbreaking AI-powered extension designed to automate secure, organization-specific code fixes. Unlike generic coding assistants that offer boilerplate advice, Agent Ox…
  continue reading
 
In the latest episode of 'Sanchez Effect', Mr. Prozorov pulls back the curtain on how, following the 2014 coup in Kiev, Ukrainian neo-Nazi battalions steadily amassed power and redirected their hatred from Eastern Ukrainians to Russians. He says those extremist group have become nearly untouchable by the local authorities. He recounts harrowing sto…
  continue reading
 
80 years after Hiroshima and Nagasaki, Japan honors the memory of the atomic bombings... without naming the country that dropped them This film reveals the uncomfortable truths airbrushed out of history: who was responsible, why the bombs were used, and why Japan’s leadership now calls out Russia, but not the US…
  continue reading
 
Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digital fraud in the company’s history. The move comes amid an alarming surge in online scams that cost global victims $16.6 billion in 2024 alone, a 33% increase from the year before. Many of these scams a…
  continue reading
 
Summary In this episode, the hosts explore key elements of effective cybersecurity incident response. They emphasize the importance of distinguishing between events and incidents, properly classifying incidents by severity, and understanding the strategic role of a vCISO (Virtual Chief Information Security Officer). The conversation highlights the …
  continue reading
 
In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Health period tracking app. Plaintiffs alleged that Meta, through embedded software tools and tracking pixels, collected deeply personal menstrual and fertility data — from period dates to pregnancy goals …
  continue reading
 
Texas Democratic House Members' boycott leads to Texas House of Representatives failing for a second day in a row to establish a quorum blocking Republicans from passing their Congressional districting plan; President Donald Trump says an interview Republicans are “entitled to five more seats” in Texas and that states which voted Democratic in nati…
  continue reading
 
In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufacturing Co. (TSMC), the world’s most advanced semiconductor producer. At the heart of the case is TSMC’s 2-nanometer (2nm) chip technology, a crown jewel in the global race for next-generation AI and hig…
  continue reading
 
On the latest ‘Sanchez Effect’ Danny Haiphong delves into how U.S. policies have nudged China into a corner, making it ready to respond with whatever it takes. But before resorting to missiles and tanks, China might opt for a blockade that could disrupt global trade as we know it. He debates with Rick Sanchez how Trump’s supposed peacemaking effort…
  continue reading
 
This is a story where one maritime company found multiple vendors maintaining unrestricted VPN access to systems across a cruise vessel, exposing safety-critical functions to potential compromise. Bill Moore, CEO of Xona Systems, returns to Error Code to talk about how that company and others, such as data center operators, are recognizing their la…
  continue reading
 
In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API protection, has raised £5 million (approximately $6.7 million) in Series A funding. The round, led by the Investment Fund for Scotland with support from Souter Investments, Lanza techVentures, and Scottis…
  continue reading
 
South African MP Nqobile Mhlongo from the Economic Freedom Fighters (EFF) delivers a critique of Donald Trump’s global tariff policies. She argues that these tariffs are part of a broader strategy of economic domination by the United States but one that’s isolating America insteadBy RT
  continue reading
 
This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organized by Trend Micro’s Zero Day Initiative (ZDI), the event is putting record-breaking payouts on the line — including up to $1 million for a zero-click WhatsApp exploit that can deliver remote code exec…
  continue reading
 
International Criminal Court (ICC) Prosecutor Kareem Khan moved to charge Israeli Prime Minister Netanyahu and former Defense Minister Gallant with war crimes. Then, out of nowhere, he's hit with a sexual misconduct allegation. The source? A US advisor with direct links to Israel. Rachel Marsden explores…
  continue reading
 
Yevghenia Gutsul, the elected leader of Moldova’s autonomous region of Gagauzia, has been sentenced to seven years in prison for allegedly financing her 2023 campaign illegally Gutsul’s lawyer Sergey Moraru breaks down why the trial was a 'public execution', how similar cases are being duplicated to silence opposition, and what the legal team plans…
  continue reading
 
Gagauzia’s governor Yevghenia Gutsul has been sentenced to 7 years in prison by a Moldovan court over alleged illegal campaign financing. Her lawyer, Natalia Bayram, calls the ruling a politically motivated 'show trial', claiming no evidence was presented, and that state media knew the verdict before the court even ruled…
  continue reading
 
In this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, to explore what it really takes to secure complex industrial systems. Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the …
  continue reading
 
A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and scaling AI models — has been found to contain critical vulnerabilities that could allow attackers to take complete remote control of affected systems. The discovery, made by cloud security firm Wiz, reveal…
  continue reading
 
New York Governor Kathy Hochul and Illinois Governor JB Pritzker are backing a group of Texas Democrats who left their state yesterday to block a vote on new Republican-drawn congressional maps. It comes while Texas' Republican Gov. Greg Abbott threatens to remove lawmakers who didn’t show up at today's Texas House of Representatives session. The T…
  continue reading
 
The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 2025 — a critical investment aimed at protecting America’s most vulnerable digital frontlines. The funding is split between the State and Local Cybersecurity Grant Program (SLCGP), allocating $91.7 mill…
  continue reading
 
In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models (LLMs) and enterprise chatbots. According to the IBM 2025 Cost of a Data Breach Report, 13% of all data breaches now involve AI systems, with the vast majority stemming from jailbreak attacks that circ…
  continue reading
 
In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical information of approximately 350,000 patients in Washington State between January 20 and January 25, 2025. What began as a so-called “network disruption” was later revealed to be a massive breach that exposed a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play