The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Welcome to the Industrial IoT podcast, by MarketScale: Your home for everything B2B in the Industrial IoT world. Join us for new episodes every week featuring conversations with industry leaders as we explore trends in technology, use-cases & applications, hurdles, and all things IoT.
…
continue reading

1
Real-World Cyber Threats in Healthcare: Balancing Tech, Training, and Human Safety
29:59
29:59
Play later
Play later
Lists
Like
Liked
29:59Cybersecurity in healthcare is facing heightened challenges as regulations shift, IoT devices proliferate, and ransomware attacks become increasingly devastating. Josh Spencer, Founder, and CIO at FortaTech Security and with over fifteen years in the field including time as CISO/CTO at UT Southwestern, explores why HIPAA changes are necessary, the …
…
continue reading

1
Securing the Foundation: Cyber Strategy in the Age of Smart Infrastructure
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12Cybersecurity is redefined as a discipline for the curious and adaptable, with a focus on continuous learning, imagination, and embracing change. On location at the RSA Conference, host Phillip Wylie and Anand Singh discusses the evolving challenges of IoT and OT security, the rapid integration of AI, and how organizations must address overlooked e…
…
continue reading

1
Identity, AI, and the Unseen Threats in Healthcare Cybersecurity – with vCISO Jason Taule
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51Healthcare IoT systems are increasingly targeted by cyber threats, necessitating a shift in strategy from isolated, organization-specific responses to a collaborative, ecosystem-wide approach. James McCarthy sits down with vCISO and 30-year information assurance and cybersecurity veteran Jason Taule. Taule brings important insights into the challen…
…
continue reading

1
The Wild West of IoT: Hacking and Securing Devices with Matt Brown
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30Matt Brown, Hardware Security Researcher, Bug Bounty Hunter, and Founder of Brown Fine Security, leaves nothing to the imagination in this conversation with host Eric Johansen on the world of embedded devices and cybersecurity. Matt shares his journey from childhood tinkering to professional vulnerability research, offering insights into the comple…
…
continue reading

1
Ep. 18 - Eliminating Human Errors w/ Patrick Thomas
1:13:26
1:13:26
Play later
Play later
Lists
Like
Liked
1:13:26What if AI-powered security could eliminate human errors in cybersecurity? Meet the founder making it happen. In this episode of Hackers to Founders, I sit down with Patrick Ben Thomas, the founder of NullZec and its advanced malware development division, Shadow Mask. Patrick shares his journey from early cybersecurity research to building a soluti…
…
continue reading

1
The Symbiosis of Tech and Nature: Securing Agriculture with Bill Lucas
42:53
42:53
Play later
Play later
Lists
Like
Liked
42:53In this episode, host Eric Johansen welcomes Bill Lucas, Senior Director of Cybersecurity at Mastronardi Produce, to explore the evolving security challenges in agricultural IoT. With over sixteen years of experience across the automotive, healthcare, and tech industries, Bill brings a deep understanding of enterprise risk management, endpoint secu…
…
continue reading

1
Ep. 17 - How AI is Changing OSINT, Dark Web Investigations, and Fraud Detection w/ Zara Perumal
1:16:32
1:16:32
Play later
Play later
Lists
Like
Liked
1:16:32What if AI could predict and prevent cyber fraud before it happens? Meet the founder making it possible " On this episode of Hackers to Founders, we feature Zara Perumal, the CTO and co-founder of Overwatch Data. The episode explores Zara’s journey from an early fascination with computer science, influenced by her software developer father, to her …
…
continue reading
What did 2024 teach us about securing the IoT and OT landscape? In this special 2024 lookback episode, Alex Nehmy, Asia Pacific CTO at Phosphorus, revisits impactful moments from industry experts and IoT Security Podcast guests, including Jason Taule, Patrick Gillespie, Sean Tufts, Michael Lester, Joel Goins, Khris Woodring, Mike Holcomb, and John …
…
continue reading

1
Ep. 16 - The Birth of the CVE System, created by Adam Shostack
1:43:24
1:43:24
Play later
Play later
Lists
Like
Liked
1:43:24Who created the CVE system? That's Adam! In this insightful episode of "Hackers to Founders," host Chris REal0day Magistrado welcomes Adam Shostack, a renowned cybersecurity expert and co-creator of the Common Vulnerabilities and Exposures (CVE) system. Adam recounts his journey from a curious and geeky childhood, engaging in activities like D&D an…
…
continue reading

1
Ep. 15 - CISO Lessons from Fox News, Point72, and Phosphorus with John Terrill
1:53:56
1:53:56
Play later
Play later
Lists
Like
Liked
1:53:56How do you defend Fox News, hedge funds, and global networks while building groundbreaking startups? John Terrill shares his journey. In this episode of Hackers for Founders, cybersecurity executive John Terrill shares his fascinating journey from a curious 12-year-old attending 2600 meetings in Atlanta to becoming a seasoned CISO and co-founder of…
…
continue reading

1
Ep. 14 - From Education platform to Browser Isolation: The Birth of SquareX w/ Vivek Ramachandran
2:10:17
2:10:17
Play later
Play later
Lists
Like
Liked
2:10:17Vivek's passion for solving nuanced, bleeding-edge problems in cybersecurity led him to found SquareX, a browser-native security product that addresses client-side web attacks. He emphasizes the importance of authenticity, community engagement, and leveraging one’s expertise to create scalable solutions. Additionally, Vivek delves into the challeng…
…
continue reading

1
Ep 13 - Finding Your Passion in Cybersecurity with Dave Chronister
2:27:23
2:27:23
Play later
Play later
Lists
Like
Liked
2:27:23From crimping cables to advising the French Minister of Defense—Dave Chronister’s journey is unreal! Step into the world of cybersecurity with Dave Chronister, a trailblazer whose career spans decades of groundbreaking achievements. As the founder of Parameter Security, Dave has helped organizations across heavily regulated industries protect their…
…
continue reading

1
A PLC Might Say "Oh No": Unlocking Comprehensive Asset Visibility with Enrique Martinez
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19In this episode, host and xIoT security evangelist John Vecchi sits down with Enrique Martinez, OT/IoT Practice Lead at World Wide Technology (WWT), to explore the critical challenges and solutions in securing OT and IoT environments. Enrique shares his journey into cybersecurity, highlights the importance of asset visibility, and discusses how AI …
…
continue reading

1
Ep 12 - Secrets of Darknet Diaries: Jack Rhysider's Path to Podcasting Excellence
2:00:15
2:00:15
Play later
Play later
Lists
Like
Liked
2:00:15Interested in the Darknet and untold stories of the internet?? On this episode of Hackers to Founders, Chris and Jack Rhysider explore the art of podcasting, focusing on Jack’s journey with Darknet Diaries and his evolution as a storyteller. They discuss community building, creating superfans, and the challenges of reaching out to guests, along wit…
…
continue reading

1
Ep. 11 - How to Start a Successful Pentesting Company: Pujan Shah and Daniel Amidon Co-Founders of ApolloGuard
1:22:58
1:22:58
Play later
Play later
Lists
Like
Liked
1:22:58Want to start your own pentesting consultancy/business? Listen how ApolloGuard created their own pentesting company, offering high-value services in a competitive market. The podcast explores the journey of Daniel Amidon and Pujan Shah, co-founders of ApolloGuard, a cybersecurity company specializing in offensive security. Daniel shares his transit…
…
continue reading

1
Strategies for Industrial Resilience: Insights from Mark Mattei
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode, Mark Mattei, Global Director of Industrial Managed Security Services at 1898 & Company, unpacks the high-stakes challenges of protecting vital systems from sophisticated attacks. Host John Vecchi highlights the critical issues surrounding IoT and OT security within industrial critical infrastructure. From the importance of cybersec…
…
continue reading

1
Ep. 10 - From Wrestling Bears to Cybersecurity: Philip Wylie, Offensive Security Expert at Horizon3.ai and Host of Phillip Wylie Show
2:06:41
2:06:41
Play later
Play later
Lists
Like
Liked
2:06:41From wrestling bears to conquering cybersecurity, Philip Wylie shares his thrilling journey of resilience, self-learning, and mentorship, offering insights into the evolving cybersecurity landscape, podcasting, and building a personal brand. In this conversation, Philip Wylie shares his journey from wrestling bears and pro wrestling to becoming a p…
…
continue reading

1
Ep.9 - Maxie Reynolds, Founder of Subsea Cloud
1:41:28
1:41:28
Play later
Play later
Lists
Like
Liked
1:41:28Join our Discord! https://discord.gg/NWN3ehgmwP In this episode of the Hackers to Founder podcast, host Chris REal0day interviews Maxie Reynolds, a pioneer in sustainable technology and cybersecurity. Maxie shares her unique journey from working offshore as a ROV pilot to founding Subsea Cloud, a company focused on underwater data centers. She disc…
…
continue reading

1
Building a Bridge Across the Divide: The Intersection of IT and OT Cybersecurity with Mike Holcomb
51:21
51:21
Play later
Play later
Lists
Like
Liked
51:21Emphasizing the importance of collaboration and communication, Mike Holcomb shares his extensive experience and practical insights into securing ICS and IoT environments. Holcomb, ICS/OT cybersecurity global lead at Fluor, stresses mastering basic cybersecurity fundamentals and asset inventory, along with the nuances of integrating IT and OT securi…
…
continue reading

1
Ep.8 - Marcus Sailler, Global Director of Red Team at MUFG
2:13:43
2:13:43
Play later
Play later
Lists
Like
Liked
2:13:43In this episode of Hackers to Founders, Chris Magistrado interviews Marcus Sailler, a seasoned expert in cybersecurity with over 25 years of experience. They discuss Marcus's journey from the military to leading red teams, the importance of understanding business impact in cybersecurity, and the nuances of interviewing in the field. Marcus shares i…
…
continue reading

1
Critical Infrastructure Security: From Awareness to Action with Khris Woodring
53:47
53:47
Play later
Play later
Lists
Like
Liked
53:47Recent years have seen a growing awareness of the vulnerabilities in our critical infrastructure to cyberattacks, particularly from nation-states like Russia, Iran, and China. In this episode of the IoT Security Podcast, host John Vecchi welcomes Khris Woodring, Senior Cybersecurity Architect at Syngenta, to explore the evolving challenges and oppo…
…
continue reading

1
Ep.7 - Lauro Perez, Host of Exploit Brokers
2:21:43
2:21:43
Play later
Play later
Lists
Like
Liked
2:21:43Chris REal0day interviews Lauro Perez, a seasoned software engineer and cybersecurity enthusiast, exploring his journey from a young computer enthusiast to a professional in the field. Lauro shares pivotal career moments, including a life-changing scholarship, navigating job offers, overcoming imposter syndrome, and the importance of mentorship. Th…
…
continue reading

1
Ep.6 - Sumit "Sid" Siddharth, Founder of SecOps Group
1:22:49
1:22:49
Play later
Play later
Lists
Like
Liked
1:22:49In this episode, Chris interviews Sid, a prominent figure in the cybersecurity field, discussing his journey from a small town in India to becoming a successful entrepreneur in the UK. Sid shares insights about his early education, the importance of peers in his career, and the transition from corporate life to founding his own company, NotSoSecure…
…
continue reading

1
Guarding the Gateways: Tackling IoT Vulnerabilities in Critical Systems with Joel Goins
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44Businesses and government organizations have seen threats to critical US infrastructure on the rise in recent years, particularly within IoT and OT systems, posed by cyberattacks, notably from state actors like Iran. With that context, Joel Goins, a veteran of manufacturing, oil and gas, and OT security at large, talks with John Vecchi about the cr…
…
continue reading

1
Ep.5 - Greg Martin, Founder of Ghost Security
1:45:07
1:45:07
Play later
Play later
Lists
Like
Liked
1:45:07In this episode of the Hackers to Founders podcast, host Chris REal0day interviews Greg Martin, a prominent figure in the cybersecurity field. Greg shares his journey from a young hacker in a small Texas town to becoming the CEO of Go Security. He discusses his early fascination with computers, the rise of Linux, and his first job at a local ISP. A…
…
continue reading

1
Ep.4 - Hahna Latonick, Director of Security Research at Dark Wolf Solutions
2:30:28
2:30:28
Play later
Play later
Lists
Like
Liked
2:30:28In this episode, Chris interviews Hannah Latonick, a cybersecurity expert with over 18 years of experience. They discuss Hannah's journey into cybersecurity, her experiences with Capture the Flag competitions, her role at Dark Wolf Solutions, and her insights on government contracts and networking. Hannah shares valuable advice for aspiring cyberse…
…
continue reading

1
Ep.3 - Alan Braithwaite, Co-Founder & CTO of RunReveal
2:13:09
2:13:09
Play later
Play later
Lists
Like
Liked
2:13:09In this episode, Chris Real0day interviews Alan Braithwaite, Co-Founder and CTO of RunReveal. They discuss Alan's journey from hacker to entrepreneur, his literary influences, the philosophical foundations of his work in cybersecurity, and the importance of curiosity and learning in the hacker mindset. Alan shares insights from his early experience…
…
continue reading

1
Ep.2 - Umit Aksu, Founder of Mobile Hacking Lab
2:08:35
2:08:35
Play later
Play later
Lists
Like
Liked
2:08:35Umit Aksu (@MobileHackingLab) In this episode, host Chris "REal0day" Magistrado sits down with Umit Aksu, Founder of Mobile Hacking Lab. Umit shares his journey into cybersecurity and reflects on his experience working with leading organizations like ING, DarkMatter, and Microsoft. From his work at these industry giants to the creation of Mobile Ha…
…
continue reading

1
Ep.1 - Jordan Wiens aka @psifertex, Co-Founder of Vector35, BinaryNinja
1:45:10
1:45:10
Play later
Play later
Lists
Like
Liked
1:45:10Jordan Wiens (@psifertex) Welcome to Episode 1 featuring host Chris "REal0day" Magistrado and special guest Jordan Wiens, @psifertex, co-founder of Vector 35 and creator of Binary Ninja. In this episode, we discuss Jordan's journey from network defense to founding Vector 35, the unique features of Binary Ninja, and the evolving landscape of reverse…
…
continue reading
Welcome to the 0 episode of "Hackers to Founders"! Join Chris Magistrado, aka REal0day, as he dives into his unique journey from gaming glitches to becoming a cybersecurity expert, business enthusiast, and podcast host. In this inaugural episode, Chris self-interviews, sharing personal stories, career advice, and essential insights for aspiring cyb…
…
continue reading

1
From Vulnerabilities to Visibility: Enhancing OT Network Security with Michael Lester
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54Explore the intricate challenges and solutions in managing OT cybersecurity, particularly emphasizing the importance of active querying over passive deep packet inspection, with Michael Lester, Senior Product Security Engineer at Rockwell Automation! Lester underscores the necessity of segmenting networks, improving visibility, and fostering collab…
…
continue reading

1
Navigating the Convergence: Securing OT in a Connected World
43:33
43:33
Play later
Play later
Lists
Like
Liked
43:33In this episode, we're diving deep into the world of Operational Technology (OT) and IoT security, exploring the critical challenges and evolving threat landscape that are impacting sectors from manufacturing to critical infrastructure and healthcare. With insights from Patrick Gillespie, an OT expert at GuidePoint Security, we'll discuss the conve…
…
continue reading

1
Unlocking Resilient Cybersecurity Solutions in Healthcare and Beyond with Jason Taule
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital role in different industries? In this episode, Brian and John are joined by cross-vertical vCISO Jason Taule, who brings a wealth of experience and insights from his diverse career in the field as one of the first CISOs...ever. From working with federal agenci…
…
continue reading

1
Securing Critical Infrastructure: Challenges and Strategies with Sean Tufts
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40Sean Tufts is in the house, and we ask him to go all the way back. All the way. From his origins to the evolving challenges and security needs in IoT and OT environments, particularly in critical infrastructure. Your hosts, Brian Contos and John Vecchi, engage in a thought-provoking conversation with special guest Sean Tufts from Optiv. The discuss…
…
continue reading

1
The Evolution of Hacking: From Counterculture to Cybersecurity with John Threat
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29Content Warning: This episode contains explicit language and references to criminal activity. In this episode, Brian and John are joined by a very special guest—John Threat, also known as John Lee, a veteran of the Great Hacker War and known as "Corrupt" from the early 90s hacking group MOD (Masters of Deception). We dive into the fascinating origi…
…
continue reading

1
The "Original Cyber-Physical System": Legacy Devices and Key Trends in OT Cybersecurity
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59She's no slacker. Danielle Jablanski has been an "expert" — she hates that word — in nuclear policy analysis (the "original Cyber-Physical System"), energy research, and now Nozomi Networks, where she plays the crucial OT cybersecurity strategist role. John Vecchi and Brian Contos pick Danielle's brain on the ever- and never-changing trends and cha…
…
continue reading

1
User-Centric Security: Focusing on UX, Design, and Embedding Security in Daily Routine
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast to discuss the importance of understanding specific features needed for different teams in IoT security. Susan Peterson Sturm has dedicated most of her career to the energy industry, where her expertise lies in asset optimization and energy market trading. However, …
…
continue reading

1
Implants, Innovation, and the Human Condition: Embracing the Technological Evolution
42:08
42:08
Play later
Play later
Lists
Like
Liked
42:08Find the line between man and machine with John, Brian, and guest Len Noe, CyberArk technical evangelist. Len, the personification of transhumanism and the future of human-machine integration, host to a number of augmentations himself, is a self-taught cybersecurity expert with a unique background in the world of black hat and gray hat hacking. For…
…
continue reading

1
The Human Component: Vulnerabilities and Leadership with Patrick Benoit of Brinks
41:00
41:00
Play later
Play later
Lists
Like
Liked
41:00What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about that a lot, working for a company with 165 years in the space. From reinforced stage coaches to the security today, there's a focus on the physical. In today's episode, John and Brian talk to Patrick Benoit about people and Things. People are the solution as well…
…
continue reading

1
Hiding Inside Devices: Unveiling Vulnerabilities in Finance, Retail, and Logistics
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29The passion for cybersecurity can arise at any moment. For our guest Andres Andreu, he started his career in software engineering, but that path was not to be. His naturally (self-described) paranoid nature drove him to constantly think about potential vulnerabilities and how to protect against them. Andres was already performing tests on his softw…
…
continue reading

1
Lessons from the Frontlines: Ron Kuriscak's Experiences with IoT Security Breaches
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02Ron Kuriscak is here to share his extensive knowledge and experiences in the world of IoT security, and has he got some great stories! Ron brings over 20 years of experience in the field to the show. He's been in the trenches on a number of high-profile breaches, giving him a unique perspective on the challenges and importance of securing IoT devic…
…
continue reading

1
Live from Las Vegas: the Black Hat experience
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Huddled in a corner, away from the lights and sounds of the slots, John and Brian reminisce about the Black Hat USA conferences gone by and what trends and topics this one already holds. In this mini-sode on location, the dynamic duo discusses AI, xIoT, and the security of slots. But when you end up in Vegas yearly, you also inevitably get up to so…
…
continue reading

1
It Only Takes One: Navigating Vulnerabilities with Dark Reading's EIC
45:28
45:28
Play later
Play later
Lists
Like
Liked
45:28Over the past 17 years, Kelly Jackson Higgins, editor-in-chief at Dark Reading, has watched the cybersecurity industry explode. She brings a unique perspective to the podcast in discussion with Brian and John as they pick apart the challenges faced in industrial environments to the vulnerabilities in healthcare organizations. Just as the world of t…
…
continue reading

1
Unmasking Cybersecurity with Dr. Zero Trust: A Conversation with Chase Cunningham
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01It's cyber all day, every day, with Chase Cunningham, Dr. Zero Trust himself. He joins John and Brian to delve into the complex and ever-evolving world of online security threats. With cyber-attacks becoming increasingly sophisticated and prevalent, understanding the strategies and technologies that can safeguard our digital assets has never been m…
…
continue reading

1
Protecting your network from insider threats with Tammy Hawkins
38:07
38:07
Play later
Play later
Lists
Like
Liked
38:07In this episode, Tammy Hawkins, a fraud specialist with over 20 years of experience, warns of the growing threat of cyberattacks on IoT devices and emphasizes the need for organizations and individuals to take proactive security measures. She offers critical advice and recommendations on how the audience — that's you! — can protect themselves again…
…
continue reading

1
SaaSy Services and Combatting Disruption with Vignesa Moorthy
40:23
40:23
Play later
Play later
Lists
Like
Liked
40:23Brian and John sit down to the mic with Vignesa Moorthy. With a seasoned background in telecommunications and cybersecurity, Vignesa Moorthy is a forward-thinking innovator in the industry. Running a successful Singapore-based telco company, he has expanded operations across Southeast Asia and evolved his company's focus to cybersecurity services. …
…
continue reading

1
The Privacy Paradox with Anna Maria Mandalari
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58Are you tired of feeling helpless and exposed when using IoT devices? Have you been told to simply 'be careful' without any real solutions? In this episode, we get our ears on some expert insights and practical solutions to help you take control of your privacy. From understanding the risks and vulnerabilities to mastering cybersecurity challenges …
…
continue reading

1
The Next Wave: AI, Infrastructure, and IoT with Mark Weatherford
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59In this episode, John and Brian talk with Mark Weatherford, a skilled cybersecurity veteran with a diverse background in both government and private sectors. Having held positions such as CISO for California and Colorado and serving in the Obama administration as the Deputy Under Secretary for Cybersecurity, Mark has a unique perspective on IoT sec…
…
continue reading

1
Hackers, Researchers, and Industry Tackle Security Challenges with IoT Village
23:01
23:01
Play later
Play later
Lists
Like
Liked
23:01In this episode, Brian and John dive into the world of Capture the Flag competitions in the realm of cybersecurity. Our special guest, Rachael Tubbs from IoT Village, discusses the rise of CTFs and how they are becoming a popular feature at cybersecurity conferences like Defcon. We explore how IoT Village is leading the way in making these conferen…
…
continue reading

1
Mastering IoT Security with Julie Tsai: Lessons from a Cyber Pro
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56In this episode, Brian and John speak with Julie Tsai. Julie Tsai is a seasoned cybersecurity expert with over 25 years of experience in Silicon Valley, navigating the complex world of securing IoT environments. With a diverse background that includes a liberal arts degree and a minor in economics from Stanford, Julie has honed her skills in system…
…
continue reading