エピソード

  • Poisoning the Software Defined Vehicle at Birth
    2026/05/08

    Your vehicle’s security might be dead on arrival if the very network that birthed it was already compromised.


    In this episode, we challenge the industry obsession with supplier code and shift the focus to the high-stakes world of cryptographic provisioning on the plant floor. We break down why a verifiable SBOM is only half the battle and how to implement fleet-scale monitoring that actually filters out the noise before it hits your cloud.


    The hard truth is that if the manufacturing environment isn't trustworthy, every security layer you add later is just a house of cards.


    Subscribe to the show and share this with anyone building the next generation of software-defined vehicles.


    #automotivecybersecurity #supplychain #infosec #softwaredefinedvehicle #iotsecurity

    続きを読む 一部表示
    34 分
  • Why Rail Operators Fear the Patch
    2026/05/06

    Most people think rail cybersecurity is a patching problem, but it is actually a validation nightmare that can stop your entire network in its tracks.


    In this episode, we break down why the standard patch or perish mindset fails when a single software update becomes an operational gamble with safety and timetables. We walk through the reality of TS 50701 and explore how data diodes and strict physical segregation provide a path forward for legacy interlockings.


    If you are securing critical rail assets, you need to stop chasing the perfect patch and start building resilience that does not require a return route into your train control domain.


    Subscribe to the show and share this with the engineer who is tired of being told to just update their firmware.


    #railsecurity #cybersecurity #criticalinfrastructure #otsecurity #ts50701

    続きを読む 一部表示
    41 分
  • When Physics is the Final Firewall
    2026/05/04

    If you think your OT security problem is a lack of awareness, you’re missing the fact that your hardware literally cannot handle the solution. 🔌


    In this episode, we’re getting real about why legacy PLCs were never meant for modern crypto and how forcing it can actually tank your process. We walk through why deep packet inspection is often a trap and how to build a defense-in-depth strategy that moves from the network all the way down to the laws of physics. 🏗️


    You need to know where the digital controls end and the mechanical interlocks begin before a "security" update shuts down your entire line. 📉


    Hit subscribe to stay ahead of the curve, and drop your take on out-of-band vs. inline in the comments.


    #OTSecurity #IndustrialCyber #CyberPhysics #ICS

    続きを読む 一部表示
    40 分
  • That is the part many cybersecurity plans still miss, OT controls under revision
    2026/05/01

    The smartest OT control in rail is often the one that leaves the certified core untouched


    #RailCybersecurity #CBTC #EN50129 #TS50701 #IEC62443 #DPI #OTSecurity #Railway


    🎯 IN THIS EPISODE:

    • Railway and transportation cybersecurity

    • AI and machine learning security risks


    📋 KEY TOPICS COVERED:

    • Railway Cybersecurity

    • AI Security


    🔑 KEY INSIGHTS:

    1. The smartest OT control in rail is often the one that leaves the certified core untouched

    2. That is the part many cybersecurity plans still miss

    3. In a CBTC or signalling environment, segmentation is not just a network design exercise


    🔧 TECHNOLOGIES & STANDARDS:

    CERT • IEC • CAN Bus • ECU • CBTC


    👥 WHO SHOULD LISTEN:

    This episode is perfect for CISOs, OT security engineers, infrastructure operators, compliance officers, cybersecurity consultants, and anyone responsible for protecting critical systems.


    💡 WHAT YOU WILL LEARN:

    • How real attacks unfold in OT/ICS environments

    • Practical defense strategies you can implement today

    • Compliance considerations (NIS2, IEC 62443, NIST)

    • Lessons from recent high-profile incidents


    🎧 SUBSCRIBE & CONNECT:

    Subscribe for weekly deep dives into real cybersecurity incidents affecting OT, ICS, and critical infrastructure. New episodes every week.


    💬 ENGAGE WITH US:

    Have questions or topics you'd like us to cover? Reach out! We love hearing from our community.


    #OTSecurity #OperationalTechnology #RailwaySecurity #TransportSecurity #AISecurity #MachineLearning #ThreatIntel #CyberThreats #CyberSecurity #InfoSec #CybersecurityUnderPressure

    続きを読む 一部表示
    35 分
  • Supply Chain: When the supplier will not cooperate resilience must become
    2026/04/29

    When the supplier will not cooperate, resilience must become hostile


    Too many OT risk programs still assume the vendor will help when it matters. In real plants, that assumption breaks fast. Large integrators often resist SBOM requests, reject monitoring agents, and defend remote access as if it were untouchable because of warranty, latency or system integrity.


    🎯 IN THIS EPISODE:

    • Regulatory compliance frameworks (NIS2, IEC 62443)

    • NIST cybersecurity framework implementation

    • AI and machine learning security risks

    • Supply chain security and third-party risk


    📋 KEY TOPICS COVERED:

    • Supply Chain Security

    • AI Security


    🔑 KEY INSIGHTS:

    1. When the supplier will not cooperate, resilience must become hostile

    2. Too many OT risk programs still assume the vendor will help when it matters

    3. In real plants, that assumption breaks fast


    🔧 TECHNOLOGIES & STANDARDS:

    NIST • ISO • IEC • PLC • CAN Bus • ECU


    👥 WHO SHOULD LISTEN:

    This episode is perfect for CISOs, OT security engineers, infrastructure operators, compliance officers, cybersecurity consultants, and anyone responsible for protecting critical systems.


    💡 WHAT YOU WILL LEARN:

    • How real attacks unfold in OT/ICS environments

    • Practical defense strategies you can implement today

    • Compliance considerations (NIS2, IEC 62443, NIST)

    • Lessons from recent high-profile incidents


    🎧 SUBSCRIBE & CONNECT:

    Subscribe for weekly deep dives into real cybersecurity incidents affecting OT, ICS, and critical infrastructure. New episodes every week.


    💬 ENGAGE WITH US:

    Have questions or topics you'd like us to cover? Reach out! We love hearing from our community.


    #OTSecurity #OperationalTechnology #AISecurity #MachineLearning #SupplyChain #ThirdPartyRisk #Compliance #CyberSecurity #InfoSec #CybersecurityUnderPressure

    続きを読む 一部表示
    34 分
  • Zero Trust in OT does not start at the HMI
    2026/04/27

    Zero Trust in OT does not start at the HMI


    That is why mature OT security does not force cloud-style identity into the final device when the device, and the workflow around it, were never built for it.


    🎯 IN THIS EPISODE:

    • Zero Trust architecture in OT environments

    • Automotive and connected vehicle security

    • AI and machine learning security risks

    • Identity and credential-based attacks

    • Authentication and access control weaknesses


    📋 KEY TOPICS COVERED:

    • OT Security

    • Zero Trust Architecture

    • Automotive Security

    • AI Security

    • Credential-Based Attacks


    🔑 KEY INSIGHTS:

    1. Zero Trust in OT does not start at the HMI

    2. It starts where incentives break traceability

    3. On an automotive assembly line, asking every operator to use strict modern identity on a shared HMI looks great on a slide


    🔧 TECHNOLOGIES & STANDARDS:

    ISO • IEC • HMI • ECU


    👥 WHO SHOULD LISTEN:

    This episode is perfect for CISOs, OT security engineers, infrastructure operators, compliance officers, cybersecurity consultants, and anyone responsible for protecting critical systems.


    💡 WHAT YOU WILL LEARN:

    • How real attacks unfold in OT/ICS environments

    • Practical defense strategies you can implement today

    • Compliance considerations (NIS2, IEC 62443, NIST)

    • Lessons from recent high-profile incidents


    🎧 SUBSCRIBE & CONNECT:

    Subscribe for weekly deep dives into real cybersecurity incidents affecting OT, ICS, and critical infrastructure. New episodes every week.


    💬 ENGAGE WITH US:

    Have questions or topics you'd like us to cover? Reach out! We love hearing from our community.


    #OTSecurity #OperationalTechnology #AutomotiveSecurity #ConnectedCar #ZeroTrust #IdentitySecurity #AISecurity #MachineLearning #Authentication #CyberSecurity #InfoSec #CybersecurityUnderPressure

    続きを読む 一部表示
    29 分
  • [2026] Critical: The NIS2 problem is no longer whether the | Incident Response
    2026/04/24

    The NIS2 problem is no longer whether the small supplier agrees with the requirement


    The NIS2 problem is no longer whether the small supplier agrees with the requirement


    🎯 IN THIS EPISODE:

    • ​ Critical vulnerability assessments and mitigations
    • ​ AI and machine learning security risks
    • ​ Incident response and crisis management


    📋 KEY TOPICS COVERED:

    • ​ NIS2 Compliance
    • ​ AI Security


    🔑 KEY INSIGHTS:

    1. ​ The NIS2 problem is no longer whether the small supplier agrees with the requirement
    2. ​ It is whether they can afford to live inside it
    3. ​ That is where many industrial programmes are hitting the wall


    🔧 TECHNOLOGIES & STANDARDS:

    CAN Bus • ECU


    👥 WHO SHOULD LISTEN:

    This episode is perfect for CISOs, OT security engineers, infrastructure operators, compliance officers, cybersecurity consultants, and anyone responsible for protecting critical systems.


    💡 WHAT YOU WILL LEARN:

    • ​ How real attacks unfold in OT/ICS environments
    • ​ Practical defense strategies you can implement today
    • ​ Compliance considerations (NIS2, IEC 62443, NIST)
    • ​ Lessons from recent high-profile incidents


    🎧 SUBSCRIBE & CONNECT:

    Subscribe for weekly deep dives into real cybersecurity incidents affecting OT, ICS, and critical infrastructure. New episodes every week.


    💬 ENGAGE WITH US:

    Have questions or topics you'd like us to cover? Reach out! We love hearing from our community.


    #OTSecurity #OperationalTechnology #NIS2 #EUCybersecurity #AISecurity #MachineLearning #IncidentResponse #SOC #CriticalInfrastructure #CIP #CyberSecurity #InfoSec

    続きを読む 一部表示
    41 分
  • [2026] Deep Dive: Some of the hardest OT risks in rail | Zero Trust
    2026/04/22

    Some of the hardest OT risks in rail stay online for one simple reason


    If you cannot harden the asset, you isolate the risk around it with controls that actually understand the traffic. That means segmentation designed for the signalling cell, tightly brokered remote access, and inspection layers that can parse the protocols the system really uses instead of treating them as opaque packets.


    🎯 IN THIS EPISODE:

    • Zero Trust architecture in OT environments

    • Railway and transportation cybersecurity

    • AI and machine learning security risks


    📋 KEY TOPICS COVERED:

    • Zero Trust Architecture

    • Railway Cybersecurity

    • AI Security


    🔑 KEY INSIGHTS:

    1. Some of the hardest OT risks in rail stay online for one simple reason

    2. You are not allowed to touch the box

    3. An operator knows a signalling component, wayside appliance, or maintenance subsystem needs tighter controls


    🔧 TECHNOLOGIES & STANDARDS:

    CERT • ISO • CAN Bus • ECU


    👥 WHO SHOULD LISTEN:

    This episode is perfect for CISOs, OT security engineers, infrastructure operators, compliance officers, cybersecurity consultants, and anyone responsible for protecting critical systems.


    💡 WHAT YOU WILL LEARN:

    • How real attacks unfold in OT/ICS environments

    • Practical defense strategies you can implement today

    • Compliance considerations (NIS2, IEC 62443, NIST)

    • Lessons from recent high-profile incidents


    🎧 SUBSCRIBE & CONNECT:

    Subscribe for weekly deep dives into real cybersecurity incidents affecting OT, ICS, and critical infrastructure. New episodes every week.


    💬 ENGAGE WITH US:

    Have questions or topics you'd like us to cover? Reach out! We love hearing from our community.


    #OTSecurity #OperationalTechnology #RailwaySecurity #TransportSecurity #ZeroTrust #IdentitySecurity #AISecurity #MachineLearning #CriticalInfrastructure #CIP #CyberSecurity #InfoSec

    続きを読む 一部表示
    36 分