エピソード

  • Oldsmar Was About Standing Trust
    2026/03/23

    In the realm of Operational Technology (OT), cyberattacks are not just IT problems; they are events with physical consequences, financial disasters, and threats to human safety. In this episode, we dive into how digital transformation and IT/OT convergence have expanded the attack surface, exposing critical infrastructure to unprecedented threats.

    We will explore devastating real-world cases that have shaped the history of industrial cybersecurity, including:

    ◦The attack on the Oldsmar water treatment plant (2021), where an attacker exploited remote access to attempt a dangerous increase in sodium hydroxide levels in the public water supply.

    ◦The ransomware attack on the Colonial Pipeline (2021), which forced a complete shutdown of physical pipeline operations supplying fuel to the US East Coast.

    ◦The Ukrainian power grid blackouts (2015 and 2016) caused by the BlackEnergy3 and Industroyer malware—the latter being the first malware specifically designed to attack power grids.

    ◦The sabotage of a German steel mill (2014), where attackers prevented the proper shutdown of a blast furnace, resulting in massive damage.

    ◦The infamous Stuxnet worm (2010), specifically designed to target industrial software and equipment like Iranian centrifuges.

    ◦The crisis at a semiconductor company (2018), which suffered $256 million in damages when a human error (connecting a new device without a virus scan) introduced the WannaCry ransomware and shut down the factory.

    ◦Legacy protocols: Older systems designed for reliability in noisy industrial environments, but lacking modern security controls like authentication or encryption.

    ◦The production vs. patching dilemma: Why applying security patches often feels riskier than leaving systems vulnerable, simply because continuous processes "cannot be stopped" without planned downtime.

    ◦Forgotten access: The critical issue of vendor VPNs opened for an urgent support session that mistakenly remain active months later.

    ◦Human error: From innocent mistakes like accidentally typing the wrong set points, to rebooting computers that cause safety systems to interpret data incorrectly and initiate plant shutdowns.

    Beyond the headlines, we will discuss the "real problems" that operators and engineers face in the trenches every day.

    Join us to understand why in the OT environment, safety and availability always trump confidentiality, and how industry standards and Zero Trust architectures offer a practical path toward resilience

    続きを読む 一部表示
    19 分
  • Why Quantum Security Paralyzes Industrial Infrastructure
    2026/03/20

    In this episode, we dive deep into a critical, long-term threat facing Operational Technology (OT) and railway infrastructure: the "harvest now, decrypt later" strategy. We explore why attackers are actively collecting telemetry histories, failure signatures, and maintenance models today, knowing their engineering value will remain highly strategic a decade from now.

    The transition to post-quantum cryptography (PQC) is a looming reality, but as we discuss, it is fundamentally an identity and trust architecture problem rather than just a payload encryption issue. Join us as we unpack the real-world challenges of implementing new NIST-standardized algorithms. We explain why blindly dropping larger cryptographic signatures into legacy field architectures can severely stress constrained links and embedded gateways.

    Finally, we reveal why the answer isn't "PQC everywhere, all at once". Listen in to learn why the future of OT security relies on crypto-agility, phased migration, and smart lifecycle design—ensuring that systems evolve without ever jeopardizing safety or availability

    続きを読む 一部表示
    24 分
  • Cybersecurity Under Pressure: The Executive Brief
    2026/03/19

    Short on time? Join hosts Marcus Webb and Riley Park for a rapid, high-level summary of our deep dive into the escalating threats facing Operational Technology (OT) and enterprise IT.

    In this brief episode, we distill the most critical takeaways from the 2025 Verizon Data Breach Investigations Report, examining why stolen credentials and third-party vulnerabilities continue to be the dominant initial access vectors.

    We provide a fast-paced overview of the most pressing blind spots in modern infrastructure: non-human and machine identities. With automated systems, devices, and gateways outnumbering human users, managing these digital identities is no longer optional, it's essential.

    Finally, Marcus and Riley break down the core principles of implementing Zero Trust in OT environments without disrupting process determinism and safety.Perfect for busy CISOs, security engineers, and plant managers who need the essential operational resilience lessons on the go.

    続きを読む 一部表示
    8 分
  • How Stolen Credentials Break Industrial Plants
    2026/03/18

    In this episode, we dive deep into the escalating threat landscape facing both enterprise IT and Operational Technology (OT) environments. Drawing from the eye-opening 2025 Verizon Data Breach Investigations Report, we unpack why stolen credentials and third-party vulnerabilities remain the top initial access vectors for ransomware and other devastating attacks.

    We move beyond theory to analyze real-world cyber incidents, from disruptive ransomware attacks on healthcare providers like Synnovis in the UK, to coordinated sabotage and malware infections impacting major European railway networks. What happens when critical infrastructure is compromised, and how can organizations prevent a cyber incident from becoming a physical safety hazard?

    Join us as we explore practical defense strategies and the concept of operational resilience. We discuss the necessity of adapting Zero Trust architectures—aligned with the NIST SP 800-207 framework—specifically for OT and Cyber-Physical Systems, where process determinism and safety are non-negotiable.

    Listeners will also learn why Identity and Access Management (IAM) is the new frontline of cybersecurity. We highlight the often-overlooked challenge of securing machine and non-human identities, which vastly outnumber human users in industrial settings and represent a massive blind spot for many security programs. Finally, we explore cutting-edge solutions for legacy environments, such as crypto-agility through exchangeable smart cards and the secure deployment of the Future Railway Mobile Communication System (FRMCS).

    Whether you're a CISO balancing IT/OT convergence, or a security engineer securing complex supply chains, this episode delivers the actionable engineering lessons you need to keep your operations running safely under pressure

    続きを読む 一部表示
    26 分
  • Cybersecurity Under Pressure: The Executive Brief
    2026/03/17

    Short on time? Join hosts Marcus Webb and Riley Park for a fast-paced executive summary of the critical threats facing AI systems today. In this bite-sized episode of "Cybersecurity Under Pressure," Marcus and Riley distill the most important lessons from real-world AI vulnerabilities into actionable insights.

    We quickly break down why stealthy "black-box" TAP attacks are outpacing complex "white-box" GCG methods, the hidden dangers of Indirect Prompt Injection (IPI) lurking in everyday documents and web pages, and why shifting from DevOps to MLSecOps is no longer optional for Agentic AI.

    Finally, get the bottom line on what the strict requirements of the EU AI Act mean for high-risk AI deployments before you launch your next system.All the essential AI cybersecurity insights you need—delivered in a concise format perfect for a quick commute!

    続きを読む 一部表示
    12 分
  • Why Hidden Text Hacks Enterprise AI
    2026/03/16

    In this episode of "Cybersecurity Under Pressure", we dive deep into the complex and rapidly evolving world of Artificial Intelligence cybersecurity. As Large Language Models (LLMs) evolve into autonomous "Agentic AI" capable of interacting with environments and executing real-world actions, the attack surface—and the pressure on security teams—has never been greater.

    Join us as we unpack critical lessons from real-world vulnerabilities, explore how threat actors are actively compromising these advanced systems, and break down what the new wave of European regulations means for the future of AI innovation.

    Key topics covered in this episode:

    The Anatomy of LLM Attacks: Discover why "black-box" tactics based on iterative searches (like the TAP attack) are proving faster and more effective at deceiving AI agents than complex "white-box" mathematical methods (like GCG).

    The Invisible Threat of Indirect Prompt Injection (IPI): Learn how attackers hide malicious instructions in web pages, emails, and resumes—sometimes using white text on a white background—to hijack AI systems and exfiltrate sensitive data without triggering traditional defenses.

    The Risks of Agentic AI: We discuss how giving AI memory, tools, and autonomy exposes organizations to new dangers, including model leakage (silent extraction of internal context) and feedback loops that amplify biases and errors.

    Building Robust Defenses with MLSecOps: We explore the essential transition from traditional DevOps to MLSecOps. Get a practical guide on securing the entire machine learning supply chain—from data engineering to model monitoring—applying a "security by design" approach.

    Navigating Regulatory Pressure (EU AI Act): We break down the strict requirements and heavy penalties under the European Union's AI Act for systems classified as "High-Risk", such as those used in critical infrastructure, hiring, education, and law enforcement.

    Tune in to learn from these real-world threats and discover how to secure AI innovation before it's too late!

    続きを読む 一部表示
    36 分
  • DDoS and Hacktivism: When Disruption Becomes a Board-Level Threat
    2026/03/13

    Not every damaging cyberattack needs sophistication. Sometimes, sustained disruption is enough.


    A slow customer portal. Unstable supplier access. Degraded telemetry. In highly automated environments, these aren't just IT headaches—they're strategic pressure points that simultaneously hit operations, communications, and the C-suite. The real danger isn't downtime; it's the loss of visibility when leadership needs it most to make critical decisions.


    This episode examines why DDoS and hacktivism have returned to the boardroom agenda, how technically simple attacks create disproportionate strategic damage, and why operational resilience now matters as much as classic perimeter defense.


    Inside this episode:

    • The "economics of pressure": Why disruption beats destruction for modern attackers

    • Operational continuity vs. uptime: Protecting visibility, not just availability

    • Fallback modes and degraded operations: Planning for when systems slow, not just when they break

    • Why automated sectors (rail, automotive, logistics) face unique DDoS visibility risks

    • Board-level metrics: How to communicate operational resilience to executives and boards


    Essential for: CISOs, infrastructure leads, business continuity planners, and security teams defending revenue-critical operations.


    Follow the show for weekly analysis on modern attack economics and operational resilience strategies.


    続きを読む 一部表示
    42 分
  • When AI Agents Become the New Insider Threat: Why Zero Trust Is No Longer Enough
    2026/03/11

    AI agents are no longer just assistants—they're autonomous operators with system access. This creates a new breed of insider threat that traditional security models can't detect or contain.


    In this episode, we break down why "least privilege" collapses when AI makes real-time decisions in physical environments like rail systems, automotive factories, and critical infrastructure.


    What you'll learn:

    • The shift from AI-as-tool to AI-as-operator (and why your firewall won't help)

    • Why workload identity and runtime authorization are replacing static permissions

    • Real-world risks: When a valid API call becomes an unsafe physical action

    • Practical frameworks for safety-aware control in autonomous systems


    Perfect for: Security architects, CISOs, DevOps teams, and AI implementers building operational technology (OT) that won't fail dangerously.


    Follow the show for weekly insights on AI security and the future of zero trust architecture.

    続きを読む 一部表示
    40 分