Infrastructure important to national security
POPULARITY
Episode #237 features a rare public interview with Brendan Dowling, Deputy Secretary for Critical Infrastructure and Protective Security at Australia's Department of Home Affairs — one of the government's most senior national security roles. Brendan was previously Australia's Ambassador for Cyber Affairs.In conversation with Vidit Agarwal, Brendan shares his journey from growing up in Melbourne with Indian and Irish heritage to operating at the heart of Australia's national security system. He reflects on the influence of a mother who migrated from Chennai, a scientist father, and a deep sense of service shaped by family, education and community.Brendan unpacks his real career story — working across refugee camps in the Middle East, representing Australia in Washington during President Trump's first term, negotiating complex international agreements with the United States, and navigating the frontlines of cyber and critical infrastructure security.It's time to explore your curiosity — please enjoy!Note: this episode was recorded on the 14th November, 2025. ________To support this podcast, check out our some of our sponsors & get discounts:→ $1,000 off Vanta: Your compliance superpower — vanta.com/highIf you're keen to discuss sponsorship and partnering with us or recommend future guests, email us at contact@curiositycentre.com today!Join our stable of commercial partners including the Australian Government, Google, KPMG, University of Melbourne and more.________CLICK HERE to read show notes from this conversation. Please enjoy!________Follow us on Instagram, LinkedIn or TwitterGet in touch with our Founder and Host, Vidit Agarwal directly hereContact us via our website to discuss sponsorship opportunities, recommend future guests or share feedback, we love hearing how to improve! Thank you for rating / reviewing this podcast on Apple Podcasts and Spotify, it helps others find us and convince guests to come on the show! ________This is the sixth episode in this special series with the Australian Government and their Centre for Australia–India Relations, highlighting the deepening ties between Australia and India across technology, business, media, culture and sport. With nearly one million people of Indian heritage now calling Australia home—the country's fastest-growing large diaspora—this series brings to light the untold stories of change makers shaping the future of both nations.Other guests in this series include Peter Varghese, Sweta Mehra, Bharat Sundaresan, Lisa Stahlalekar and Sanjeev Gandhi, reflecting the breadth of Indian-Australian impact at the most senior levels across government, education, sport, business and culture.________The High Flyers Podcast is described as a "meticulously researched biography" that uncovers the untold stories of remarkable people and companies -- redefining the "high flyer". Launched in 2020, we have ranked in the global top ten podcasts for past two years, with listeners in 27 countries and over 200 episodes released. Excerpts of the podcast have been featured in Forbes, AFR, Daily Telegraph, and showcased at SXSW.200+ guests have joined host, Vidit Agarwal on the show from 15+ countries. Prominent guests include Malcolm Turnbull (Prime Minister of Australia), Anil Sabharwal (VP, Product for Google Chrome, Photos and Drive), Andy Penn (CEO, Telstra), Stevie Case (Chief Revenue Officer, Vanta), Brad Banducci (CEO, Woolworths), Jillian Broadbent (Board Member, Macquarie Capital), Sweta Mehra (EGM, NAB; ex CMO, ANZ), Bowen Pan (Creator, Facebook Marketplace), Sam Sicilia (Chief Investment Officer, Hostplus), Niki Scevak (Co-Founder, Blackbird Ventures), Mike Schneider (CEO, Bunnings), Trent Cotchin (3x Premiership Winning Captain, Richmond Football Club), Jason Collins (Head of Australasia, BlackRock) and many more. Our parent company, Curiosity Centre is your on-demand intelligence hub for knowledge, connections and growth to achieve your potential, everyday. Join 200,000+ Investors, Founders, Functional Leaders, CEOs and Emerging Leaders. Learn with the world's best and be 1% better everyday at https://curiositycentre.com
PREVIEW Guest: Henry Sokolski. Sokolski describes a new warfare tactic piloted by Russia that utilizes non-nuclear strategic weapons to disable critical infrastructure nodes, such as electricity and communications. While China is actively building these intercontinental systems to force surrender without nuclear fallout, the U.S. currently lacks a coherent response to this specific threat.
Tom Sego, founder and CEO of BlastWave, discussed his background in chemical engineering and his journey through various industries, including roles at Caterpillar, Eli Lilly, Emerson Electric, Alta Vista, and Apple. He explained that BlastWave was founded to combine Apple’s ease of use with cybersecurity, focusing on protecting critical infrastructure as it becomes increasingly digitized. Tom emphasized that human error is a significant security risk, citing an example from the San Jacinto Water District. This Follower Friday podcast is sponsored by UTSI International. Tom's podcast includes: Critical infrastructure sectors (like oil and gas, transportation, and manufacturing) face higher cyber risks than traditional IT systems due to the severe consequences of attacks and the challenge of securing legacy devices. Integrating old and new technologies is achieved by using a translation mechanism that enables secure communication between legacy systems and modern infrastructure. Artificial intelligence (AI) has a dual impact: it can enhance attackers' ability to automate cyberattacks, but it also offers opportunities to improve security, such as by eliminating vulnerabilities like passwords. Technology solutions are essential for reducing the human burden in security, especially for defending against phishing and reconnaissance attacks. Eliminating attack vectors (e.g., usernames and passwords) can significantly reduce security risks, regardless of how effective or frequent attacks become. Focusing on the safety of critical infrastructure allows people to prioritize what matters most in life, such as family, relationships, and health. To be an Insider Please subscribe to The Green Insider powered by ERENEWABLE wherever you get your podcast from and remember to leave us a five-star rating. This podcast is sponsored by UTSI International. To learn more about our sponsor or ask about being a sponsor, contact ERENEWABLE and the Green Insider Podcast. The post Securing Critical Infrastructure: Insights from Tom Sego appeared first on eRENEWABLE.
In this episode of Disruption/Interruption, host KJ sits down with Min Kyriannis, a trailblazer in the global security industry and CEO of Amyna Systems. Min shares her journey from immigrant roots to industry leadership, discusses the evolving landscape of network security, and explains how Amyna Systems is revolutionizing device-level protection. The conversation covers the challenges of legacy technology, the importance of proactive security, and Min’s commitment to both technological and humanitarian causes. Four Key Takeaways: The Human Element is the Weakest Link [11:03]Min emphasizes that despite technological advances, human error and lack of education remain the biggest vulnerabilities in network security. Legacy Systems Create Modern Risks [16:00]Integrating old technologies with new networks opens up significant security gaps, as outdated protocols are not designed for today’s threats. Proactive Security Over Reactive Patching [15:01]The industry often relies on patching vulnerabilities as they arise, but Min advocates for addressing root causes to prevent issues before they occur. Amyna Systems’ Revolutionary Approach [25:12]Amyna Systems has developed patented technology that detects and remediates anomalies within seconds, providing a new layer of defense for modern networks. Quote of the Show (24:29):“You have to be constantly learning. You have to be constantly trying to discover something, and it’s always fascinating to see what’s there.” – Min Kyriannis Join our Anti-PR newsletter where we’re keeping a watchful and clever eye on PR trends, PR fails, and interesting news in tech so you don't have to. You're welcome. Want PR that actually matters? Get 30 minutes of expert advice in a fast-paced, zero-nonsense session from Karla Jo Helms, a veteran Crisis PR and Anti-PR Strategist who knows how to tell your story in the best possible light and get the exposure you need to disrupt your industry. Click here to book your call: https://info.jotopr.com/free-anti-pr-eval Ways to connect with Min Kyriannis: LinkedIn: https://www.linkedin.com/in/mkyri Company Website: https://amyna.io/ How to get more Disruption/Interruption: Amazon Music - https://music.amazon.com/podcasts/eccda84d-4d5b-4c52-ba54-7fd8af3cbe87/disruption-interruption Apple Podcast - https://podcasts.apple.com/us/podcast/disruption-interruption/id1581985755 Spotify - https://open.spotify.com/show/6yGSwcSp8J354awJkCmJlDSee omnystudio.com/listener for privacy information.
What happens when the power goes out—and it's not an accident?In recent years, attacks on our nation's critical infrastructure have revealed just how fragile these modern systems we all rely on really are. When infrastructure fails, the effects cascade fast: hospitals strain, medical devices stop working, fuel pumps go offline, and public safety degrades. Civilians often suffer the most, even though they play no role in protecting these systems.In this episode, we examine real attacks on the U.S. power grid, what actually happened on the ground, how some plots were detected and stopped, and what these incidents reveal about risk, preparedness, and resilience.We'll also explore what you can realistically do—without paranoia or vigilantism—to recognize warning signs, respond during outages, and reduce second-order effects when systems fail.So, pull up a chair and sit a spell as we talk about When the Grid Fails: Lessons from Real Attacks Nation's Infrastructure.Resources:Learn about DHS' National Infrastructure Protection PlanBaltimore Substation Plot 2022DOJ Press Release on the Washington State AttackAdditional news stories here and hereSupport the showGet Members Only Content when you upgrade to a premium membership on our Substack page. Click here.Link up with us:Website: Pearl Snap TacticalInstagram: Pearl Snap Tactical X: Pearl Snap TaciticalThe views and opinions expressed by the guests do not necessarily reflect those of the host, this podcast or affiliates. The information provided in these shows are for educational purposes do not constitute legal advice. Those interest in training in the use of firearms or other self-defense applications are advised to seek out a professional, qualified instructor.(Some of the links in the episode show notes are affiliate links. This means that if you make a purchase through these links, we may earn a commission at no additional cost to you. We only recommend products or services we have personally used and believe will add value to our listeners.)
The digital battleground is shifting, and in 2026, Ignorance is not a defense. With the global cost of a data breach skyrocketing, understanding and adhering to the newest wave of cybersecurity laws is non-negotiable for business survival. Join us as we decode the essential 2026 Cybersecurity Laws and Regulations that act as the sentinels for personal privacy and business integrity worldwide. This episode cuts through the complexity to give you the key takeaways for your compliance strategy.
Podcast: Security Weekly Podcast Network (Audio) (LS 47 · TOP 1% what is this?)Episode: Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359Pub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359The podcast and artwork embedded on this page are from Security Weekly Productions, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list Show Notes: https://securityweekly.com/asw-359
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list Show Notes: https://securityweekly.com/asw-359
When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity's most critical blind spots: industrial control systems that keep society running but remain dangerously exposed. What You'll Learn: Why industrial control systems can't be updated like your laptop—and what that means for security How threat actors are using AI to generate custom malware for power plants and water treatment facilities The real state of critical infrastructure security (spoiler: forget about air gaps) Why commodity ransomware has become an existential threat to industrial operations The five critical controls organizations should implement right now to defend OT environments Don't wait until your organization becomes the next headline. Like, share, and subscribe for more in-depth security intelligence that goes beyond the buzzwords. #industrialcybersecurity #criticalinfrastructure #OTsecurity #ICS #SCADA #dragos #incidentresponse #ransomware #AIthreats #cybersecurity #infosec
Today, Dominic Bowen hosts Dr Tim Stevens on The International Risk Podcast to examine how hybrid threats, cyber operations and infrastructure vulnerabilities are reshaping Europe's security environment. They discuss how adversaries exploit the interdependence of digital, physical and informational systems, why hybrid activity sits deliberately below the threshold of open conflict, and how these pressures are redefining strategic risk for governments, businesses and critical-infrastructure operators across Europe. Together they explore how cyber intrusions, sabotage, supply-chain exposure and targeted information operations generate cumulative effects that undermine resilience, erode trust and complicate decision-making.Dr Tim Stevens is Reader in International Security at King's College London and co-director of its Cyber Security Research Group. His work analyses the politics of cybersecurity, hybrid threats, cyber risk and the global contest over technological infrastructures. He is the author of several leading publications in the field, including Research Handbook on Cyberwarfare (2024) and What Is Cybersecurity For? (2023). His research examines how cyber operations intersect with societal vulnerabilities, strategic signalling and governance capacity, offering perspectives that inform policymakers, security professionals and institutions responding to the rapidly evolving cyber-hybrid threat landscape.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Subscribe for all our updates!Tell us what you liked!
Should space be designated as critical infrastructure? What are the threats we're facing in space for cybersecurity? We tackle these questions with our guest Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin. You can connect with Jake on LinkedIn. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Are you tired of hearing "It's too technical bro…"? $ BTC 87,162 Block Height 925,015 Today's guest is @lukedewolf, who joins me to discuss the Knots vs. Core debate and the recent appearance of BIP 444. Key Topics: Bitcoin Knots Core Bitcoin Improvement Proposals (BIPs) BIP444 Decentralization Critical Infrastructure Cybersecurity Mining 'Spam' Transactions Luke explains his background in industrial control systems cybersecurity and draws parallels to Bitcoin as critical infrastructure. He emphasises the need for layered defences to protect against various threats and that filters, even basic ones, can effectively block a significant percentage of attacks. Follow Luke: X - @lukedewolf NOSTR - npub1fk8h6g8zhftw8c7pga2zjd84p2z949up5lc3qdchm9v4m0q7mwws7jcwld Bitcoin Infinity Podcast - https://www.youtube.com/@BitcoinInfinityShow Check out my book ‘Choose Life' - https://bitcoinbook.shop/search?q=prince ALL LINKS HERE - FOR DISCOUNTS AND OFFERS - https://vida.page/princey - https://linktr.ee/princey21m Pleb Service Announcements: Join 19 thousand Bitcoiners on @cluborange https://signup.cluborange.org/co/princey Support the pod via @fountain_app -https://fountain.fm/show/2oJTnUm5VKs3xmSVdf5n The Once Bitten YouTube Channel: https://www.youtube.com/@Princey21m The Bitcoin And Show: https://www.bitcoinandshow.com/ https://fountain.fm/show/eK5XaSb3UaLRavU3lYrI Shills and Mench's: CONFERENCES 2025: BITFEST - MANCHESTER - ENGLAND - 21st - 23rd November 2025. https://bitfest.uk/ - USE CODE BITTEN - 10% BTC JAPAN - TPKYO - 23rd - 24th November. https://btc-jpn.com/en USE CODE BITTEN - 10% PAY WITH FLASH. Accept Bitcoin on your website or platform with no-code and low-code integrations. https://paywithflash.com/ RELAI - STACK SATS - www.relai.me/Bitten Use Code BITTEN SWAN BITCOIN - www.swan.com/bitten BITBOX - SELF CUSTODY YOUR BITCOIN - www.bitbox.swiss/bitten Use Code BITTEN PLEBEIAN MARKET - BUY AND SELL STUFF FOR SATS; https://plebeian.market/ @PlebeianMarket ZAPRITE - https://zaprite.com/bitten - Invoicing and accounting for Bitcoiners - Save $40 KONSENSUS NETWORK - Buy bitcoin books in different languages. Use code BITTEN for 10% discount - https://bitcoinbook.shop?ref=bitten SEEDOR STEEL PLATE BACK-UP - @seedor_io use the code BITTEN for a 5% discount. www.seedor.io/BITTEN SATSBACK - Shop online and earn back sats! https://satsback.com/register/5AxjyPRZV8PNJGlM HEATBIT - Home Bitcoin mining - https://www.heatbit.com/?ref=DANIELPRINCE - Use code BITTEN. CRYPTOTAG STEEL PLATE BACK-UP https://cryptotag.io - USE CODE BITTEN for 10% discount.
The Army is taking the next step in its ambitions to start using small nuclear reactors to power critical infrastructure on at least some of its bases. This week, the service started the solicitation process for its Janus program via the Defense Innovation Unit, and assuming the technology works out the way the Army thinks it will, we now also know some of the first bases that are most likely to benefit from it. Details here from Federal News Network's Jared Serbu,See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Send us a textWe explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines.• life on the road, burnout signals and recovery• global threats to critical infrastructure and state actor pressure• startup culture, expectations and keeping teams healthy• Jason's path through engineering to entrepreneurship• identity's failure modes and why credentials are stolen• asymmetric, hardware-bound authentication and device posture• extending identity to agents, drones and satellites• cyber-physical risk and why finance invests heavily• identity as the universal control plane in cloud• practical steps to prevent session hijack and MFA fatigueConnect with Jason: “Hit me up on LinkedIn… our website, beyondidentity.com… even X”Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Podcast: Bad ActorsEpisode: E38: The Unseen Threats to Critical Infrastructure with Patrick GillespiePub date: 2025-10-23Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Bad Actors, host Rebecca Craddick speaks with Patrick Gillespie, OT Practice Director at GuidePoint Security, about the unique and often misunderstood world of operational technology (OT) and its critical role in many areas, from manufacturing to public utilities.Patrick discusses the increasing threats to critical infrastructure, the challenges of bridging the gap between IT and OT teams, and the importance of adopting a "survivable" security posture. He also explains how GuidePoint's partnership with Armis helps organizations gain visibility into their OT environments and prioritize vulnerabilities. This episode is a must-listen for anyone interested in the evolving landscape of cybersecurity and the protection of our most vital systems.The podcast and artwork embedded on this page are from Armis, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Shane Curley, Fianna Fáil Senator, Pa Daly, Sinn Féin TD for Kerry and Party Spokesperson on the Environment, Energy and Transport, Sinéad Gibney, Social Democrats TD for Dublin Rathdown and Tabitha Monahan, Political Correspondent with the Irish Independent.
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:Critical infrastructure sectors on the most concerning threats – and needed solutions. “With critical infrastructure constantly under myriad threats, sector-focused information sharing and analysis centers and organizations collect, analyze and disseminate actionable cyber and physical threat information to stakeholders and provide them with tools to mitigate risks and enhance resiliency. To mark Cybersecurity Awareness Month, Threat Beat asked: 1) What is the most pressing short-term security concern in your sector? 2) What is one thing the public and/or industry/government can do now to address this?” Responses include DNG-ISAC, E-ISAC, FB-ISAO, Food and Ag-ISAC, Health-ISAC, MS-ISAC, ONE-ISAC, Space ISAC, and WaterISAC. Main Topics:Canadian Centre for Cyber Security: Alert - AL25-016 Internet-accessible industrial control systems (ICS) abused by hacktivists. In recent weeks, the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports of incidents involving internet-accessible ICS. One incident affected a water facility, tampering with water pressure values and resulting in degraded service for its community. Another involved a Canadian oil and gas company, where an Automated Tank Gauge (ATG) was manipulated, triggering false alarms. A third one involved a grain drying silo on a Canadian farm, where temperature and humidity levels were manipulated, resulting in potentially unsafe conditions if not caught on time. Hackers are attacking Britain's drinking water suppliers(TLP:CLEAR) Threat Analysis for the Water and Wastewater Sector, October 2025 – Executive SummaryThreat Snapshot: Cyber Threats Remain Heightened Amid Lapse In Information Sharing Authorities, Government Shutdown. As Cybersecurity Awareness Month comes to a close and Critical Infrastructure Security and Resilience Month nears, today, the House Committee on Homeland Security released an updated “Cyber Threat Snapshot,” outlining the heightened threats posed by malign nation-states and criminals to U.S. networks and critical infrastructure since 2024. Read the previous “Cyber Threat Snapshot,” which outlined threats from 2021 through 2024, here. 2 shot dead at Tennessee plastics plant by gunman who was ex-employee. Two employees of a plastics maker were fatally shot Monday morning in Cleveland, Tennessee, by an employee in the process of termination, authorities said. The two men killed at Barku Plastics were Tobias Gleinig and Ivan Aldergot, police said. Both were supervisors at the plant and citizens of Germany, Cleveland Police Capt. Evie West said at a news conference Monday night. Barku is a subsidiary of Barku Kunststofftechnik, a plastics producer established in Germany in 1977, which confirmed the "violent deaths" of Gleinig and Aldergot in a statement.Quick Hits:• Hurricane Melissa makes historic landfall in Jamaica as Category 5 storm• 'Total devastation': Hurricane Melissa leaves trail of destruction, flooding in Jamaica• ‘Tremendous unprecedented devastation' in Jamaica from Hurricane Melissa, UN coordinator says• Hurricane Melissa death toll nears 50 as Jamaica relief efforts intensify and storm heads north• Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says
Live from #DCDVirginia 2025, Alexandra Bromson, Managing Director of Origination at Available Infrastructure, joins JSA TV to discuss the urgent need for national security-grade cyber protection for smart cities and digital infrastructure.In this discussion, Alexandra breaks down the serious risks of "AI Poisoning" where attackers corrupt AI models by feeding them bad data and how it can be used to cause serious risk to operations, safety and reputation.Learn how Available Infrastructure's SanQtum AI platform provides a defense, using a CISA-compliant zero trust architecture, NIST-approved quantum-resilient encryption, and a nationwide fleet of quantum-ready micro data centers to protect the future of AI. #CriticalInfrastructure #Cybersecurity #AIPoisoning
Today, I sit down with Bill Capuzzi, CEO of Apex Fintech Solutions, to explore the critical infrastructure powering modern fintech investing. Bill shares the fascinating journey of Apex from its roots as a pioneer in API-enabled clearing to fractional share trading and becoming the clearing firm behind investment accounts for close to 25 million people across household names like Robinhood, SoFi, and Betterment.The conversation dives deep into what it takes to be a reliable infrastructure player in fintech, from opening accounts in seconds, to enabling investment globally, to Apex's bold expansion plans with State Street and their strategic embrace of stablecoins. Bill also pulls back the curtain on how Apex uses AI inside the company and shares his perspective on the complex plumbing that makes seamless, modern fintech experiences possible. It's a rare inside look at the unsexy but essential backbone of the fintech revolution.In this podcast, you will learn:Bill's interesting journey from environmental scientist to fintech entreprenuer.Why he decided to join Apex ten years ago.How their capabilities were so different to the traditional custodians.What a clearing broker does exactly.How the idea for fractional share trading came about.How they have built their brand in the fintech space.Why they are seeing interest from banks and traditional wealth providers today.The only two firms that have left Apex and why they left.How they are working with the digital assets/stablecoins space today.Why they sold Apex Crypto to Bakkt in 2022.How they are growing internationally.What their partnership with State Street means for Apex.What Apex is doing to prepare for the AI-enabled future.What Bill is most excited about for the future of Apex.Connect with Fintech One-on-One: Tweet me @PeterRenton Connect with me on LinkedIn Find previous Fintech One-on-One episodes
In this special Cybersecurity Awareness Month episode of the Tech for Business podcast, Todd (COO and CISO) and Nate (Director of Cybersecurity) discuss the importance of critical infrastructure and its relationship to cybersecurity. They provide insights into what constitutes critical infrastructure, the impact of legacy systems, and the foundational best practices for cybersecurity. Key highlights include the significance of multifactor authentication, password security, network segmentation, and the role of culture in cybersecurity measures. Whether you are a private business owner or part of critical infrastructure, this episode offers practical advice and strategies to enhance your cybersecurity posture.00:00 Introduction to Critical Infrastructure and Cybersecurity00:34 Defining Critical Infrastructure01:26 Impact of Critical Infrastructure on Daily Life02:15 Identifying Critical Infrastructure04:23 Cybersecurity Best Practices05:36 Challenges in Securing Legacy Systems07:32 Password Security and Common Mistakes10:02 Approaching Legacy Systems: Patch or Replace?15:51 Barriers to Improving Security19:27 Practical Advice for Dealing with Legacy Systems21:40 Conclusion and Future TopicsSources: https://www.cbsnews.com/news/china-hacking-us-critical-infrastructure-retired-general-tim-haugh-warns-60-minutes-transcript/https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors
The Cyber Security and infrastructure security agency has been sounding the alarm about cyber threats to us critical infrastructure like power and water systems. CISA officials are particularly concerned about hackers targeting so called operational technology or OT systems. Targeting of those systems could pose major health and safety risks. For more on what the agency is doing to combat those threats. Federal News Network's Justin Doubleday spoke with the OT cyber lead at CISA, Matt Rogers.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
2025-10-21 | Silicon Wafers 036 | DAILY UPDATES | Is Russia's Hybrid War on Europe a precursor to a full incursion on European territory, or even the invasion of a European country? This is Silicon Wafers. Today: why Russia is probing and testing Europe, how hybrid attacks work, and what happens if the Kremlin pushes further escalating to a full invasion — and how we can deter it.Why the probing is intensifying - Moscow is stress-testing Europe's seams, pulling at the threads to see if the fabric of our institutions and resilience will unravel. But it is conducting this below the threshold of open war — because hybrid pressure is cheap, deniable, and strategically useful. Sub-threshold does not trigger a direct armed response but can also achieve Russia's strategic objectives without direct confrontation. It's a war sandbox, for testing and learning. Think of it as a toolkit of rolling lab experiments in limited aggression: sabotage, arson, cyber, GPS jamming, “grey fleet” shenanigans at sea, drones in NATO airspace, and influence operations that launder Kremlin narratives through local proxies, compliant channels and criminal networks.----------Partner on this video: KYIV OF MINE Watch the trailer now: https://www.youtube.com/watch?v=arJUcE1rxY0'Kyiv of Mine' is a documentary series about Ukraine's beautiful capital, Kyiv. The film production began in 2018, and much has changed since then. It is now 2025, and this story is far from over.https://www.youtube.com/@UCz6UbVKfqutH-N7WXnC5Ykg https://www.kyivofmine.com/#theprojectKyiv of Mine is fast paced, beautifully filmed, humorous, fun, insightful, heartbreaking, moving, hopeful. The very antithesis in fact of a doom-laden and worthy wartime documentary. This is a work that is extraordinarily uplifting. My friend Operator Starsky says the film is “Made with so much love. The film series will make you laugh and cry.” ----------SOURCES: IISS — The Scale of Russian Sabotage Operations Against Europe's Critical Infrastructure* (research paper, Aug. 2025). Council of the EU — Statement condemning Russia's persistent hybrid campaigns (July 18, 2025); EU hybrid-threats sanctions framework (Oct. 8, 2024; prolonged Oct. 3, 2025)Reuters — Poland/Romania foil exploding-parcel plot (Oct. 21, 2025); Spanish minister's jet GPS interference near Kaliningrad (Sept. 24, 2025); German CHOD: 5–8 year window (Apr. 18, 2024); Hybrid threat to Europe's energy (Oct. 13, 2025)AP News — Arrests tied to parcel-bomb plot in Poland and Romania (Oct. 21, 2025)The Guardian — Sikorski on drone incursion: “tactically stupid and counterproductive” (Oct. 15, 2025)The Insider — Inside Russia's Latvian Sabotage Squad (July 10, 2024)Meduza - ‘There has to be a cost' — Russian sabotage spiked in Europe last year (Mar. 21, 2025)RFE/RL — Admiral Rob Bauer warning (NATO readiness) (Jan. 19, 2024); IISS sabotage overview (Aug. 20, 2025)UK Government — Condemnation of “malicious cyber activity by the Russian Intelligence Services” (May 3, 2024); UK/US advisory on Star Blizzard spear-phishing (Dec. 7, 2023)ACLED — Suspected Russia-linked hybrid incidents across Europe (2022–Apr. 2025)Estonian Foreign Intelligence Service — International Security and Estonia 2025 (threat horizon)----------SILICON CURTAIN FILM FUNDRAISERA project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's front-line towns.https://buymeacoffee.com/siliconcurtain/extras----------
Get the stories from today's show in THE STACK: https://justinbarclay.comJoin Justin in the MAHA revolution - http://HealthWithJustin.comProTech Heating and Cooling - http://ProTechGR.com New gear is here! Check out the latest in the Justin Store: https://justinbarclay.com/storeKirk Elliott PHD - FREE consultation on wealth conservation - http://GoldWithJustin.comTry Cue Streaming for just $2 / day and help support the good guys https://justinbarclay.com/cueUp to 80% OFF! Use promo code JUSTIN http://MyPillow.com/JustinPatriots are making the Switch! What if we could start voting with our dollars too? http://SwitchWithJustin.com
Every day, critical infrastructure is under siege with about 1.2 million cyberattacks per day. For facility managers, that means cybersecurity isn't just an IT issue, it's a frontline responsibility. In today's episode, Stacey Shepard and E.J. von Schaumburg from Building Cybersecurity, discuss why facility managers must treat digital threats with the same urgency as physical ones and how leaders can use proactive strategies, assessments and insurance awareness to stay prepared. Together, they share how facility managers can build resilience, safeguard their organizations, and lead the way in a world where cyber risk is constant.Sponsor:This episode is sponsored by ODP Business Solutions! 00:00 Introduction: The Growing Threat of Cyber Attacks00:19 Podcast Overview and Guest Introduction01:23 Understanding Cybersecurity in Facility Management02:24 The Importance of Data Management02:54 Building Cybersecurity: Framework and Training03:38 The Role of Facility Managers in Cybersecurity05:01 Cybersecurity Training and Preparedness08:11 Insurance and Risk Management11:11 Leadership and Legal Implications11:48 Resources and Conclusion Connect with Us:LinkedIn: https://www.linkedin.com/company/ifmaFacebook: https://www.facebook.com/InternationalFacilityManagementAssociation/Twitter: https://twitter.com/IFMAInstagram: https://www.instagram.com/ifma_hq/YouTube: https://youtube.com/ifmaglobalVisit us at https://ifma.org
AI is transforming our world, but is its infrastructure secure? In this Robots and Red Tape episode, host Nick Schutt sits down with Matt Wesmiller, a counterintelligence veteran, to explore the unseen risks in critical infrastructure security. Matt reveals the complexity of supply chains, from adversary-controlled rare earth minerals to data poisoning threats in AI models. “The human is always the weakest link,” he warns, citing insider threats like Robert Hanssen. From intellectual property theft to fragile water systems, Matt emphasizes proactive counterintelligence to protect national security. Essential listening for those invested in AI's risks and rewards. Tune in to uncover strategies to safeguard our tech-driven future. Subscribe for more tech-driven insights: / @RobotsandRedTapeAI
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More
In this episode of AI with Maribel Lopez, Maribel sits down with Ian Bramson, Vice President of Global Industrial Cybersecurity at Black & Veatch, to explore the growing intersection between artificial intelligence and operational technology (OT) security.From power grids and oil refineries to manufacturing plants, critical infrastructure systems are becoming increasingly connected—and therefore more vulnerable. Ian shares how Black & Veatch is helping industrial organizations rethink cybersecurity from the ground up, integrating protection early in the design and build process rather than bolting it on later.Together, Maribel and Ian discuss the evolution of OT threats, the rise of AI in both defense and attack scenarios, and why cybersecurity must be seen as a core business function, not an afterthought.
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! 2016: The Dawn of Modern Ransomware The debut of Petya and Russian-affiliated groups like CryptoWall, TeslaCrypt, and Locky. Attacks were largely indiscriminate, targeting anyone from Fortune 500 companies to "Grandma's laptop." Early mitigation tactics, like installing Russian language packs to avoid infection, highlighted the state-tolerated nature of these groups. 2017: Ransomware Goes Mainstream A pivotal year with the WannaCry attack (attributed to North Korea's Lazarus Group) and NotPetya (Russian-backed), causing billions in damages to companies in multiple verticals. The SAMSAM attacks hit U.S. cities like Baltimore and Atlanta, marking Iran's brief foray into ransomware. Ransomware became a household name, sparking executive-level discussions in boardrooms. 2020: The Rise of Ransomware-as-a-Service Groups like Ryuk, REvil, and Conti refined ransomware into a business model, outsourcing tasks like initial access and money laundering. Double extortion emerged, with attackers stealing data and threatening to leak it, even if backups were restored. Some groups introduced “terms of service,” avoiding hospitals and schools to dodge law enforcement scrutiny. 2021: Critical Infrastructure in the Crosshairs High-profile attacks on Colonial Pipeline, JBS Foods, and Ireland's National Health Service disrupted daily life, from gas shortages to meat supply issues. These incidents underscored ransomware's real-world impact, elevating cybersecurity to a boardroom priority. 2022: Geopolitical Shifts and New Players Russian-backed groups like Conti and LockBit shifted focus to Ukraine amid the Russia-Ukraine conflict. The rise of Scattered Spider, a Western-based group excelling at social engineering and SIM swapping, marked a shift from Eastern state-tolerated actors. 2023: Trust Breaks Down The ALFV/BlackCat group's $22 million rug pull against affiliates signaled the decline of Russian-backed ransomware dominance. Scattered Spider solidified its reputation, targeting major hospitality and cleaning companies with sophisticated social engineering tactics. 2025: The Western Cybercrime Surge Scattered Spider and affiliates like DragonForce dominate, hitting retailers, insurance, aviation, and automotive sectors. The shift to Western-based actors, often young and operating in Five Eyes nations, makes them more vulnerable to law enforcement. Trends and Takeaways The move from expensive zero-day exploits to cheaper n-day exploits and social engineering highlights attackers' adaptability. Double extortion and even “double dipping” (demanding additional ransoms months later) have become standard tactics. The accessibility of AI tools and open-source platforms like Venice AI has lowered the barrier for creating ransomware, even for non-programmers. Law enforcement's increasing success in arrests and Bitcoin recovery (e.g., DarkSide's downfall) offers hope for curbing cybercrime. Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Ben - https://www.linkedin.com/in/benjamincorll/
The Cybersecurity and infrastructure Security Agency is hyper focused on its core priorities of defending government networks and critical infrastructure. That's the key message from Nick Anderson, CISA's new Executive Assistant Director for Cybersecurity, Federal News Network's Justin Doubleday spoke with Anderson as part of our Cyber Leaders Exchange 2025.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Mosley-Romero shares common threats towards critical infrastructure and advice for security leaders navigating different challenges.
The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.Somasundaram's path to founding Asimily began with diverse technical experience spanning telecommunications and early machine learning development. This foundation proved essential when he transitioned to cybersecurity, eventually building and growing the IoT security division at a major enterprise security company.During his corporate tenure, Somasundaram gained direct exposure to security challenges across healthcare systems, industrial facilities, utilities, manufacturing plants, and oil and gas operations. Each vertical revealed the same fundamental problem: existing security solutions were designed for traditional IT environments where confidentiality and integrity took precedence, but operational technology environments operated under entirely different rules.The mismatch became clear through everyday operational realities. Hospital ultrasound machines couldn't be taken offline during procedures for security updates. Manufacturing production lines couldn't be rebooted for patches without scheduling expensive downtime. Power plant control systems required continuous availability to serve communities. These environments prioritized operational continuity above traditional security controls.Beyond technical challenges, Somasundaram observed a persistent communication gap between security and operations teams. IT security professionals spoke in terms of vulnerabilities and patch management. Operations teams focused on uptime, safety protocols, and production schedules. Neither group had effective frameworks for translating their concerns into language the other could understand and act upon.This divide created frustration for Chief Security Officers who understood risks existed but lacked clear paths to mitigation that wouldn't disrupt critical business operations. Organizations could identify thousands of vulnerabilities across their operational technology environments, but struggled to prioritize which issues actually posed meaningful risks given their specific operational contexts.Somasundaram recognized an opportunity to approach this problem differently. Rather than building another vulnerability scanner or forcing operational environments to conform to IT security models, he envisioned a platform that would provide contextual risk analysis and actionable mitigation strategies tailored to operational requirements.The decision to leave corporate security and start Asimily wasn't impulsive. Somasundaram had previous entrepreneurial experience and understood the startup process. He waited for the right convergence of market need, personal readiness, and strategic opportunity. When corporate priorities shifted through acquisitions, the conditions aligned for his departure.Asimily's founding mission centered on bridging the gap between operational technology and information technology teams. The company wouldn't just build another security tool; it would create a translation layer enabling different organizational departments to collaborate effectively on risk reduction.This approach required understanding multiple stakeholder perspectives within client organizations. Sometimes the primary user would be a Chief Information Security Officer. Other times, it might be a manufacturing operations head managing production floors, or a clinical operations director in healthcare. The platform needed to serve all these perspectives while maintaining technical depth.Somasundaram's product engineering background informed this multi-stakeholder approach. His experience with complex system integration—from telecommunications infrastructure to machine learning algorithms—provided insight into how security platforms could integrate with existing IT infrastructure while addressing operational technology requirements.The vision extended beyond traditional vulnerability management to comprehensive risk analysis considering operational context, business impact, and regulatory requirements. Rather than treating all vulnerabilities equally, Asimily would analyze each device within its specific environment and use case, providing organizations with actionable intelligence for informed decision-making.Somasundaram's entrepreneurial journey illustrates how diverse technical experience, industry knowledge, and strategic timing converge to address complex market problems. His transition from corporate executive to startup founder demonstrates how deep industry exposure can reveal opportunities to solve problems that established players might overlook or underestimate.Today, as healthcare systems, manufacturing facilities, and critical infrastructure become increasingly connected, the vision Somasundaram brought to Asimily's founding has proven both timely and necessary. The company's development reflects not just market demand, but the value of approaching familiar problems from fresh perspectives informed by real operational experience.Learn more about Asimily: itspm.ag/asimily-104921Note: This story contains promotional content. Learn more.Guest: Shankar Somasundaram, CEO & Founder, Asimily | On LinkedIn: https://www.linkedin.com/in/shankar-somasundaram-a7315b/Company Directory: https://www.itspmagazine.com/directory/asimilyResourcesLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Podcast: Simply ICS CyberEpisode: Maritime Cybersecurity Threats & Critical InfrastructurePub date: 2025-09-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Simply ICS Cyber, co-hosts Don C. Weber and Tom VanNorman are joined by maritime and energy cybersecurity expert Marco (Marc) Ayala — vOT-CISO, Senior Principal Advisor for Energy, Oil, and Gas at the Cyber Infrastructure Protection Innovation Center (CIPIC), President of InfraGard Houston Members Alliance, and National Sector Chief of Energy for InfraGard.Marc has spent his career at the intersection of ICS/OT security, maritime operations, and critical infrastructure protection. His work includes advancing cybersecurity for the energy and oil & gas industries, driving innovation at CIPIC, and building collaborative bridges between public and private sectors to defend against nation-state and criminal threats.If you're interested in the challenges of maritime cyber resilience, industrial control systems, operational technology, or energy sector defense, this episode offers rare insights from one of the field's most active leaders.Connect with Marc on LinkedIn: https://www.linkedin.com/in/marco-marc-ayala-a3b26934Episode Links:InfraGuard: https://www.infragardnational.org/ISA Fellows: https://www.isa.org/membership/recognition/fellowsPort of Corpus Christi, Texas: https://portofcc.com/Port of Galveston, Texas: https://www.portofgalveston.com/Port of Houston, Texas: https://porthouston.com/
Podcast: ICS Cyber Talks PodcastEpisode: Haim Halevy Sela CISO @critical infrastructure power plants on challenges & cyber @Energy industryPub date: 2025-09-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationשני סיסויים נכנסים לאולפן.....נשמע כמו התחלה של בדיחה טובה. הגנה על תשתיות קריטיות היא משימה מורכבת, האחריות מחד והצורך ללהטט בין הרגולציה להנהלה מאידך נחשון פינקו מארח את חיים הלוי סלע סיסו מוכר ומוערך באחת מחברות האנרגיה הגדולות בישראל לשיחת סיסויים על תחושת האחריות, ההתמודדות היום יומית עם סייבר בתקופת מלחמה, האם הרגולציה עוזרת או מפריעה, איך בוחרים טכנולוגיה ואיך מגייסים ההנהלה והדירקטוריון להתמודדות עם סיכוני סייבר Two CISOs enter a studio.... sounds like the start of a good joke. Protecting critical infrastructure is a complex task, a responsibility on the one hand, and the need to juggle regulation and management on the other Nachshon Pincu hosts Haim Halevy Sela, a well-known CISO at one of Israel's largest energy companies, for a CISO conversation about the sense of responsibility, the daily dealings with cyber in times of war, whether regulation helps or hinders, how to choose technology, and how to mobilize management and the board of directors to deal with cyber risks.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: AI, Quantum, and Cybersecurity: Protecting Critical Infrastructure in a Digital WorldPub date: 2025-09-08Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow is joined by Kathryn Wang, Principal of Public Sector at SandboxAQ, for a wide-ranging and candid conversation about the critical role AI and quantum technology are playing in today's cybersecurity landscape. Kathryn and Aaron break down complex concepts like quantum cryptography and the growing risks of deepfakes, data poisoning, and behavioral warfare - all with real-world examples that hit close to home. They dig into why cryptographic resilience is now more urgent than ever, how AI can both strengthen and threaten our defenses, and why your grandma shouldn't be left in charge of her own data security. From lessons learned in power plants and national defense to the nuances of protecting everything from nuclear codes to family recipes, this episode dives deep into how we can balance innovation with critical risk management. Kathryn shares practical advice on securing the basics, educating your network, and making smart decisions about what truly needs to be connected to AI. Whether you're an IT, OT, or cybersecurity professional—or just trying to keep ahead of the next cyber threat - this episode will arm you with insights, strategies, and a little bit of much-needed perspective. Tune in for a mix of expert knowledge, humor, and actionable takeaways to help you protect it all. Key Moments: 04:02 "Securing Assets in Post-Quantum Era" 07:44 AI and Cybersecurity Concerns 12:26 "Full-Time Job: Crafting LLM Prompts" 15:28 AI Vulnerabilities Exploited at DEFCON 19:30 AI Data Poisoning Concerns 20:21 AI Vulnerability in Critical Infrastructure 23:45 Deepfake Threats and Cybersecurity Concerns 28:34 Question Everything: Trust, Verify, Repeat 33:20 "Digital Systems' Security Vulnerabilities" 35:12 Digital Awareness for Children 39:10 "Understanding Data Privacy Risks" 43:31 "Leveling Up: VCs Embrace Futurism" 45:16 AI-Powered Personalized Medicine About the guest : Kathryn Wang is a seasoned executive with over 20 years of leadership in the technology and security sectors, specializing in the fusion of cutting-edge innovations and cybersecurity strategies. She currently serves as the Public Sector Principal at SandboxAQ, where she bridges advancements in post-quantum cryptography (PQC) and data protection with the mission-critical needs of government agencies. Her work focuses on equipping these organizations with a zero-trust approach to securing sensitive systems against the rapidly evolving landscape of cyber threats. During her 16-year tenure at Google and its incubator Area120, Kathryn drove global efforts to develop and implement Secure by Design principles in emerging technologies, including Large Language Models (LLMs) and Generative AI. How to connect Kathryn : https://www.linkedin.com/in/kathryn-wang/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this week's Security Sprint, Dave and Andy covered the following topics: Warm Open:• Nerd Out EP 61. The 2/3 of the Year Awards!Main Topics:FBI PSA - Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure. The Federal Bureau of Investigation (FBI) is warning the public, private sector, and international community of the threat posed to computer networks and critical infrastructure by cyber actors attributed to the Russian Federal Security Service's (FSB) Center 16. The FBI detected Russian FSB cyber actors exploiting Simple Network Management Protocol (SNMP) and end-of-life networking devices running an unpatched vulnerability (CVE-2018-0171) in Cisco Smart Install (SMI) to broadly target entities in the United States and globally. Info Ops: • Most Adults in 25 Countries Say Spread of False Information Is a Top National Threat. The findings come from Pew's seventh iteration of its Global Attitudes Survey: International Opinion on Global Threats, which was last published in 2022. • Foreign disinformation enters AI-powered era. At least one China-based technology company, GoLaxy, seems to be using generative AI to build influence operations in Taiwan and Hong Kong… Documents also show that GoLaxy has created profiles for at least 117 members of Congress and over 2,000 American political figures and thought leaders.• Toxic politics and TikTok engagement in the 2024 U.S. election• Why wind farms attract so much misinformation and conspiracy theory UN - Terror threat posed by ISIL ‘remains volatile and complex,' Security Council hears. The threat posed by the terrorist group ISIL – known more widely in the Middle East as Da'esh – remains dynamic and diverse, with Africa currently experiencing the highest level of activity worldwide.• PDF: Remarks by Mr. Vladimir Voronkov, Under-Secretary-General for Counter-Terrorism, United Nations Office of Counter-Terrorism. • PDF: Remarks by Mr. Vladimir Voronkov, Under-Secretary-General, United Nations Office of Counter-Terrorism.• UN Report: ISIS Fighters' Migration to Afghanistan and the Taliban's Failure• ISIS-K poses major threat with 2,000 fighters in Afghanistan, UN saysFEMA Employees Warn That Trump Is Gutting Disaster Response. After Hurricane Katrina, Congress passed a law to strengthen the nation's disaster response. FEMA employees say the Trump administration has reversed that progress. Employees at the Federal Emergency Management Agency wrote to Congress on Monday warning that the Trump administration had reversed much of the progress made in disaster response and recovery since Hurricane Katrina pummeled the Gulf Coast two decades ago. The letter to Congress, titled the “Katrina Declaration,” rebuked President Trump's plan to drastically scale down FEMA and shift more responsibility for disaster response — and more costs — to the states. It came days before the 20th anniversary of Hurricane Katrina, one of the deadliest and costliest storms to ever strike the United States.Quick Hits:• 25% of security leaders replaced after ransomware attack• Gate 15: Hack Yourself First: Pen Testing for Prevention • FB-ISAO: Ransomware Incident Review January to June 2025• Dissecting PipeMagic: Inside the architecture of a modular backdoor framework• Maryland Transit Administration says cybersecurity incident is affecting some of its servicesNevada state government offices closed after network security incident• Audit of Antisemitic Incidents 2024• MIT report: 95% of generative AI pilots at companies are failing• Report: Russian Sabotage Operations In Europe Have Quadrupled Since 2023• CISA Requests Public Comment for Updated Guidance on Software Bill of Materials• Risky Bulletin: NIST releases face-morphing detection guideline• CVE-2025–41688: Bypassing Restrictions in an OT Remote Access Device• Think before you Click(Fix): Analyzing the ClickFix social engineering technique
E131 The Fifth CourtCo-host of the Fifth Court, Peter Leonard, BL, met with Kirk Offel at the Dublin Tech Summit, promoter of the 5th Industrial Revolution.'Data centres are the most important things to be manufactured in the world'. That's Kirk's view and that's just the beginning of this terrific chat about all things AI and Data Centres.Kirk is not your typical tech CEO. From a military family, a former US Navy submariner, nuclear-trained engineer, cancer survivor, and now founder of Overwatch Mission Critical, he brings a mix of discipline, resilience, and purpose to the fast-changing world of digital infrastructure. His company designs and delivers the data centres that make the cloud, AI, and mission-critical systems possible — what he likes to call “the sky for the cloud.”You'll also learn everything you ever wondered about life in a submarine under the ocean...though some of what he's done he can't talk about.Before that, Peter and Mark Tottenham, BL, examine notable recent court decisions featured on Decisis.ie including:A 'Proceeds of Crime' case and whether it should be reopened with new material comes to light?A case full of energy, including a windfarm, a hydrogen plant and turf-cutting.Another planning case, this one regarding an old paint factory that was being used to house migrants. It turned out to be a moot case.Whether you're in practice or just passionate about the law, this episode is a must-listen for its clarity, depth, and practical relevance.Sponsored by Charltons Solicitors and Collaborative Practitioners – family law with a collaborative approach. Hosted on Acast. See acast.com/privacy for more information.
In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlighted. We also delve into a critical infrastructure breach where Russian hackers remotely accessed a Norwegian dam's control system. Additionally, the episode covers Google's vulnerabilities in its AI and Gmail services, and finally, Apple's significant privacy victory against the UK's backdoor encryption mandate. The episode concludes with a call for listener support through donations to sustain the program. 00:00 Introduction and Headlines 00:23 Workday Data Breach Explained 02:15 Windows Update Issues 04:05 Norwegian Dam Cyber Attack 05:49 Google's Security Challenges 07:12 Apple's Privacy Victory 08:19 Conclusion and Listener Support
Podcast: Hack the Plant (LS 35 · TOP 3% what is this?)Episode: Local Infrastructure is Critical InfrastructurePub date: 2025-08-13Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOur host Bryson sits down with Colin Ahern and Kirk Herath, two of the only cybersecurity experts working in Governors' offices in the United States. Colin was appointed Chief Cyber Officer of the State of New York by Governor Kathy Hochul in June 2022, and Kirk stepped into his role as Cybersecurity Strategic Advisor to Ohio Governor Mike DeWine and Lt. Governor Jon Husted the same year. In their positions, Colin and Kirk are responsible for coordinating their states' cybersecurity capabilities, overseeing threat assessment and response, working with local governments to prepare for and remediate cyber attacks, and more. What were the critical lessons learned in building statewide cybersecurity programs from the ground up? How do states navigate the shifting landscape of federal support? And what are the biggest challenges and opportunities on the horizon for cyber czars and strategic advisors across the country? “You can't replicate these shared services unless you're doing it together. You just can't. We can either succeed together or we can fail separately. There's really not a middle ground where we can all have exactly everything we want all the time. Because like we've said, this is a risk management exercise in a world of limited resources,” Colin explained. Join us for this and more on this episode of Hack the Plan[e]t. The views and opinions expressed in this podcast represent those of the speaker, and do not necessarily represent the views and opinions of their employers. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology.The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com
Podcast: Simply ICS CyberEpisode: S1 E3: Critical Infrastructure vs. Everything ElsePub date: 2025-03-19Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Simply ICS Cyber, Don and Tom interview Gus Serino, water sector expert and Owner at I&C Secure, Inc.Listen in as we will answer the following questions:- What is Critical Infrastructure?- What are other types of Industrial and Automation?- Is cybersecurity different between the two?Links from this episode:- Gus Serino LinkedIn: https://www.linkedin.com/in/gusserino/- Instrumentation & Control Secure, Inc.: https://www.iandcsecure.com/- S4Events - Water Sector Cyber Risk with Gus Serino: https://www.youtube.com/watch?v=ScigBpXIjggJoin us every other Wednesday for Season 1 of the Simply ICS Cyber podcast, with your hosts, Don C. Weber and Tom VanNorman.Connect with your hosts on LinkedIn:- Don https://www.linkedin.com/in/cutaway- Tom https://www.linkedin.com/in/thomasvannorman=========================Simply Cyber empowers people who want a rewarding cybersecurity career=========================All the ways to connect with Simply Cyberhttps://SimplyCyber.io/Socials=========================The podcast and artwork embedded on this page are from Simply Cyber Media Group, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Declassified emails and memos reveal the Clinton campaign may have fabricated Trump–Russia collusion to distract from her email scandal. The PBD Podcast crew exposes Obama-era FBI failures, media complicity, and the deeper implications for justice, accountability, and free speech.
Keywordscybersecurity, military transition, Tampa cybersecurity, mentorship, cyber law, incident response, private sector, cybersecurity misconceptions, legal perspectives, cybersecurity growth SummaryIn this episode of No Password Required, hosts Jack Clabby and Kayley Melton sit down with Kurt Sanger — former Deputy General Counsel at U.S. Cyber Command — to talk about the evolving world of cyber law, the wild ride from government service to private sector strategy, and what keeps him grounded in a field that's constantly shifting. Kurt dives into the fast-growing cybersecurity scene in Tampa, the power of mentorship, and why people still get cyber law so wrong. Plus: insights on responding to incidents under pressure and what role the government should (and shouldn't) play in the digital fight. TakeawaysKurt emphasizes that newcomers to cybersecurity are not as far behind as they think.The transition from military to private sector can be challenging but rewarding.Tampa is becoming a significant hub for cybersecurity talent and companies.Understanding cybersecurity misconceptions is crucial for decision-makers.Mentorship plays a vital role in navigating career challenges in cybersecurity.Military and civilian cyber law have distinct differences in enforcement and flexibility.The stakes in private sector cybersecurity can be incredibly high for clients.Kurt's experience highlights the need for collaboration between government and private sectors.Cybersecurity is an ever-evolving field that requires continuous learning.Kurt finds excitement in helping clients during their most challenging times. Sound bites "You're only six months behind.""We're all in the same boat.""The government needs to step back." Chapters 00:00 NPR S6E7 Kurt Sanger52:53 NPR S6E7 Kurt Sanger01:45:47 Introduction to Cybersecurity Conversations01:48:22 Transitioning from Military to Private Sector Cybersecurity01:51:11 The Growth of Tampa as a Cybersecurity Hub01:54:05 Understanding Cybersecurity Misconceptions01:57:15 The Role of Mentorship in Cybersecurity Careers02:00:24 Military vs. Civilian Cybersecurity Law02:03:07 The Excitement of Cyber Command vs. Private Sector02:13:52 High Stakes in Cybersecurity for Small Organizations02:15:44 The Role of Legal Experts in Cybersecurity02:17:21 Translating Technical Jargon for Clients02:18:57 Challenges of Explaining Cyber Operations to Commanders02:22:43 Lifestyle Polygraph: Fun Questions and Insights02:23:30 The 10,000 Hour Rule in Cybersecurity02:29:34 Creative Freedom with LEGO Bricks02:31:27 Tampa's Culinary Delights and Local Favorites
In the latest Nerd Out, Alec and Dave welcome in Hunter Headapohl to talk about the cyber basics, and why so many threats can be prevented by following appropriate cyber hygiene. Alec and Hunter share their best practices and some of their tools and resources that can be leveraged to mitigate risk.Some of the references from the pod include:Top Cyber Actions for Securing Water Systems - https://www.cisa.gov/resources-tools/resources/top-cyber-actions-securing-water-systemsDefending OT Operations Against Ongoing Pro-Russia Hacktivist Activity - https://www.cisa.gov/resources-tools/resources/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activityIRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities - https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335aChina Strategically Infiltrates U.S. Critical Infrastructure as Cyberattacks Escalate - https://thesoufancenter.org/intelbrief-2025-january-10/Secure by Design - https://www.cisa.gov/securebydesignCISA Training - https://www.cisa.gov/resources-tools/training
Tanya Janca joins the show this week, with unique perspective on building secure software and advocating for better cybersecurity policy.George K and George A talk to Tanya about: Her transition from 14 years as a Canadian public servant to private sector entrepreneurship The core values that guide her work: performing good and moving the industry toward secure software Entrepreneurship since age 19: solving real problems that hurt badly enough for people to pay Civil advocacy for security by design policies and challenging inadequate government cybersecurity practicesTanya's perspective on building businesses around genuine problem-solving rather than just seeking acquisition or wealth creation offers valuable insights for any founder. Whether you're interested in secure coding, entrepreneurship, or how to advocate for better cybersecurity policy, this episode delivers actionable insights from someone who's been in the trenches and made real impact.Mentioned: The Eh List: https://ehlist.org/ Forte Group: forte-group.org/home-our-mission Tanya's petition: https://www.ipetitions.com/petition/secure-canadas-future Tanya's Secure Coding Guideline: newsletter.shehackspurple.ca/c/secure-coding-guideline
What does the future of enterprise networking really look like? In this episode, Extreme Networks' Chief Product & Technology Officer Nabil Bukhari joins Craig to explore how AI, autonomous agents, and platform thinking are transforming the core infrastructure of modern businesses. From managing mission-critical networks to building agentic systems that collaborate, troubleshoot, and scale autonomously - this is a deep dive into how connectivity is being redefined from the ground up. Whether you're a tech leader, CIO, product builder, or simply curious about how infrastructure evolves, this conversation reveals where the enterprise is headed next. Check out Extreme Networks: https://www.extremenetworks.com/ Stay Updated: Craig Smith on X: https://x.com/craigss Eye on A.I. on X: https://x.com/EyeOn_AI (00:00) Preview (01:02) Introducing Nabil Bukhari & Extreme Networks (05:24) Why Global Connectivity Is Still Accelerating (07:54) How Enterprise Data Flows Across Modern Networks (12:34) Networking for AI vs. Built-in AI (14:12) Platform One & Agentic AI Systems Explained (21:20) Human-in-the-Loop, Over-the-Loop, and Above-the-Loop (23:35) Why AI Guardrails Must Be Baked into the Architecture (27:33) Introducing the ARC Framework (31:15) Persona-Based Interfaces for NetOps, CFOs & CMOs (33:25) The Problem with Chatbots (36:06) Enterprise vs. Public Networks (38:38) Global Connectivity Infrastructure & Use Case Variability (44:29) How Secure and Resilient Are Enterprise Networks? (52:24) In-House AI for Critical Infrastructure
CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercriminals abusing Large Language Models. MacOS malware Poseidon Stealer rebrands.Researchers discover multiple vulnerabilities in Bluetooth chips used in headphones and earbuds. The FDA issues new guidance on medical device cybersecurity. Our guest is Debbie Gordon, Co-Founder of Cloud Range, looking “Beyond the Stack - Why Cyber Readiness Starts with People.” An IT worker's revenge plan backfires. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, Debbie Gordon, Co-Founder of Cloud Range, shares insights on looking “Beyond the Stack - Why Cyber Readiness Starts with People.” Learn more about what Debbie discusses in Cloud Range's blog: Bolstering Your Human Security Posture. You can hear Debbie's full conversation here. Selected Reading CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment (CISA) Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran (CISA, FBI, DOD Cyber Crime Center, NSA) Prolific cybercriminal group now targeting aviation, transportation companies (Axios) U.S. Cyber Diplomacy at Risk Amid State Department Shakeup (GovInfo Security) Canada Bans Chinese CCTV Vendor Hikvision Over National Security Concerns (Infosecurity Magazine) Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos (Hackread) MacOS malware Poseidon Stealer rebranded as Odyssey Stealer (SC Media) Airoha Chip Vulnerabilities Expose Headphones to Takeover (SecurityWeek) FDA Expands Premarket Medical Device Cyber Guidance (GovInfo Security) 'Disgruntled' British IT worker jailed for hacking employer after being suspended (The Record) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Join us as we sit down with Matt Nicolls, Chief Digital Innovation Officer at Technology Partners, to uncover the unique story behind his creative approach to leadership. Matt shares how his early experiences shaped his passion for visually mapping out solutions, and how this skill has become central to his work in technology. Listeners will hear about the mentors who inspired him, the power of transparency in business, and how bringing “something extra” to the table can make all the difference in driving innovation and building strong teams.Guest Links:Matt's LinkedInTechnology PartnersCredits: Host: Lisa Nichols, Executive Producer: Jenny Heal, Marketing Support: Landon Burke and Joe Szynkowski, Podcast Engineer: Portside Media