BBC Radio 5 live’s award winning gaming podcast, discussing the world of video games and games culture.
…
continue reading
Player FM - Internet Radio Done Right
Checked 29d ago
Dodano three lat temu
Treść dostarczona przez Claroty. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Claroty lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !
Przejdź do trybu offline z Player FM !
Nexus: A Claroty Podcast
Oznacz wszystkie jako (nie)odtworzone ...
Manage series 3308427
Treść dostarczona przez Claroty. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Claroty lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
93 odcinków
Oznacz wszystkie jako (nie)odtworzone ...
Manage series 3308427
Treść dostarczona przez Claroty. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Claroty lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
93 odcinków
Wszystkie odcinki
×N
Nexus: A Claroty Podcast

1 Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard 40:39
40:39
Na później
Na później
Listy
Polub
Polubione40:39
Florence Hudson, working group chair of the IEEE/UL 2933 standard and framework for Clinical IOT Data and Device Interoperability with TIPPSS, joins the Nexus Podcast. Published last September, the standard establishes a framework for secure data exchanges between clinical IoT and medical devices and systems. The frameworks is based on TIPPSS principles (trust, identity, privacy, protection, safety, and security) clinical IoT such as in-hospital devices, wearable devices, investigational devices. Follow and subscribe to the Nexus Podcast .…
N
Nexus: A Claroty Podcast

1 Mike Holcomb on Starting and Succeeding in OT Cybersecurity 42:40
42:40
Na później
Na później
Listy
Polub
Polubione42:40
Mike Holcomb, global lead for ICS and OT cybersecurity at Fluor , joins the Nexus Podcast to discuss his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems. Mike produces and hosts a learning series available for free on YouTube called " Getting Started in ICS/OT Cyber Security " where he explains the fundamentals of this unique cybersecurity discipline On the podcast, he discusses his experience with those in IT now responsible for OT, how to best assess and mitigate risk within OT, and some of the practical threats that matter most to practitioners. Follow the Nexus Podcast here.…
N
Nexus: A Claroty Podcast

1 Ron Fabela on Low-Skilled OT and ICS Threat Actors 36:33
36:33
Na później
Na później
Listy
Polub
Polubione36:33
Ron Fabela of ABS Consulting joins the Nexus Podcast to dispel some of the myths surrounding threat actors targeting operational technology and industrial control systems. Groups such as the Russian Cyber Army, UserSec, and the CyberAv3ngers have different ideological motivations, and have decidedly carried out low-impact attacks on OT. Fabela covers some of their tactics, whether they're better marketers than hackers, and reminds users that their exploits still merit investigation and remediation. Listen to every episode of the Nexus Podcast here .…
N
Nexus: A Claroty Podcast

1 Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents 33:25
33:25
Na później
Na później
Listy
Polub
Polubione33:25
Munish Walther-Puri of the Center for Global Affairs at New York University joins the Claroty Nexus podcast to discuss a homegrown severity scale for critical infrastructure cybersecurity incidents. The Infrastructure Cyber Incident Scale, or INCI Scale, brings a Richter-Scale-like criticality index to incidents based on the intensity, magnitude, and duration of an event. Walther-Puri unveiled the scale at the S4 Conference in Tampa.…
N
Nexus: A Claroty Podcast

1 Brian Foster on the Risks of a Hyperconnected Grid 27:17
27:17
Na później
Na później
Listy
Polub
Polubione27:17
Brian Foster, Senior Advisor for Grid Security at Southern California Edison, joins the Nexus Podcast to discuss a presentation he gave at the S4 Conference called . Foster covers the impending risk and host of exposures expected as smart meters and other similar devices are centrally managed online. This scenario gives attackers the ability to attack devices at scale and potentially cause catastrophic damage. Listen to every episode of the Nexus Podcast here.…
N
Nexus: A Claroty Podcast

1 CISA's Matthew Rogers on Secure by Demand for OT 39:23
39:23
Na później
Na później
Listy
Polub
Polubione39:23
Matthew Rogers, ICS Cybersecurity Strategy & R&D Lead at the Cybersecurity & Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency's latest publication: “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.” This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors. Read Claroty's blog on the guide . Listen to every episode of the Nexus Podcast here .…
N
Nexus: A Claroty Podcast

Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices. Read Team82's research blog: " Inside a New OT/IoT Cyberweapon: IONCONTROL " Listen and subscribe to the Nexus Podcast here .…
N
Nexus: A Claroty Podcast

1 Team82 on Attacking the Insecure IoT Cloud 31:38
31:38
Na później
Na później
Listy
Polub
Polubione31:38
Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network. You can find the research here on Team82's website . Listen and subscribe to the Nexus Podcast here .…
N
Nexus: A Claroty Podcast

1 Volexity's Steven Adair on the Nearest Neighbor Attack 37:23
37:23
Na później
Na później
Listy
Polub
Polubione37:23
Volexity founder Steven Adair joins the Claroty Nexus Podcast to discuss the Nearest Neighbor Attack, a unique attack carried out by Russia's APT 28 against a high-value target in an attempt to gain intelligence on Ukraine prior to the start of the war in February 2022. APT 28 was able to compromise the Wi-Fi network of its target without being in physical proximity of it. They did so by remotely compromising neighboring organizations, accessing their Wi-Fi networks—creating a daisy-chain of breaches and compromises—until they were able to reach their target. Volexity's blog contains additional technical details. Listen to every episode of the Nexus Podcast here .…
N
Nexus: A Claroty Podcast

1 Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure 34:43
34:43
Na później
Na później
Listy
Polub
Polubione34:43
Runsafe Security CEO and Cofounder Joe Saunders joins the Nexus Podcast to discuss the strategic shift from certain APTs toward destructive cyberattacks targeting U.S. critical infrastructure. Groups such as Volt Typhoon and Sandworm have aggressively focused their efforts on hacking OT, IoT, and healthcare organizations, opening new fronts that asset owners and operators, as well as manufacturers of embedded systems must now contend with.…
N
Nexus: A Claroty Podcast

1 Grant Geyer on the Business Impact of Disruptions from Cyberattacks 25:03
25:03
Na później
Na później
Listy
Polub
Polubione25:03
Claroty Chief Strategy Officer Grant Geyer joins the Nexus Podcast to discuss the results of a survey of 1,100 cybersecurity leaders and practitioners on the business impact of disruptions from cyberattacks on cyber-physical systems. The financial losses are steep from these attacks impacting connected systems that are so central to our way of life, as are the recovery costs and operational impacts such as downtime, which is often intolerable in critical industries such as manufacturing and healthcare. Geyer brings his unique insights to the discussions, including attackers' motivations in targeting CPS, why ransomware continues to impact healthcare delivery organizations, and the risks of unsecured third-party and supply chain connections to the enterprise. Get the full survey results here .…
N
Nexus: A Claroty Podcast

1 Alethe Denis on Social Engineering, Red-Teaming 43:45
43:45
Na później
Na później
Listy
Polub
Polubione43:45
Bishop Fox senior security consultant Alethe Denis joins the Claroty Nexus podcast to discuss social engineering in cybersecurity and how it has become part of red-team engagements, especially inside critical infrastructure organizations. She explains the value of open source intelligence and data stolen in breaches to scammers and extortionists in creating pretexts for their schemes. She also explains how to best defend against these tactics that aid threat actors in weaponizing personal information against victims and organizations. For more, visit nexusconnect.io/podcasts .…
N
Nexus: A Claroty Podcast

1 Alon Dankner on Extracting Crypto Keys from PLCs 27:58
27:58
Na później
Na później
Listy
Polub
Polubione27:58
Alon Dankner of the Technion Institute for Technology in TelAviv Israel joins the Claroty Nexus Podcast to discuss a presentation he gave at the recent Black Hat cybersecurity conference in Las Vegas. Dankner and colleague Nadav Adir's presentation looked at the attack surface of programmable logic controllers (PLCs), in particular Siemens’ S7 protocol. Dankner and Adir developed six attacks against the encryption implementation in the protocol that expose private crypto keys and allow an attacker full control over the industrial control system. For more, visit nexusconnect.io/podcasts…
N
Nexus: A Claroty Podcast

1 Noam Moshe on Extracting Forensic Data from Unitronics PLCs 27:52
27:52
Na później
Na później
Listy
Polub
Polubione27:52
Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to talk about Team82’s research into Unitronics Vision series integrated HMI/PLC devices. The OT devices were exploited last year in attacks against water treatment facilities in the U.S. and Israel. Team82 researched the security of these devices and developed a pair of tools that allowed them to extract forensic information from the PLCs. Both tools were released to open source on Team82’s Github page. Moshe also presented this research today at the Black Hat Briefings in Las Vegas. Read Team82’s research blog here. Download the forensics tools here. For more, visit nexusconnect.io/podcasts…
N
Nexus: A Claroty Podcast

1 Alexander Antukh on Cyber Risk Quantification 43:05
43:05
Na później
Na później
Listy
Polub
Polubione43:05
Alexander Antukh, CISO of AboitizPower in the Philippines, the country's largest power and renewable energy provider, joins the Nexus Podcast to discuss cyber risk quantification (CRQ). CRQ is a popular framework used to assess the financial impact of a cybersecurity threat on an organization. Antukh is an advocate of CRQ, and discusses his approach to using it to predict risk in his organization, what level of organizational maturity is required for this approach to succeed, and how it's being applied in operational technology (OT) environments. For more, visit nexusconnect.io/podcasts…
Zapraszamy w Player FM
Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.