POPULARITY
Podcast: The Threatpost Podcast (LS 34 · TOP 5% what is this?)Episode: IoT Piranhas Are Swarming Industrial ControlsPub date: 2021-07-23Threat actors have been building enormous botnets using IoT devices to try to compromise the computing systems that control crucial infrastructure, such as pipelines (case in point: the DarkSide ransomware attack on Colonial Pipeline) and other utilities, preying on legacy systems that have decades-old vulnerabilities. In this Threatpost podcast, Armis CISO Curtis Simpson delves into how to fight back.The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Threatpost Podcast (LS 34 · TOP 5% what is this?)Episode: From Triton to Stuxnet: Preparing for OT Incident ResponsePub date: 2020-11-11Threatpost talks to Dragos' Lesley Carhart about the top cybersecurity challenges facing manufacturers during the pandemic.The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Threatpost PodcastEpisode: Critical Industrial Flaws Pose a Patching Headache For ManufacturersPub date: 2020-09-23Sharon Brizinov, the principal vulnerability researcher with Claroty, who discovered vulnerabilities a software component used by various critical infrastructure systems, talks about why patching is a headache for manufacturers and other industrials firms.The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Dennis Fisher is joined by Brian Donohue, Chris Brook, and Mike Mimoso to discuss the experience of watching the Black Hat talks online this year and what progress the industry has made in keeping people secure.
Podcast: The Threatpost PodcastEpisode: Sponsored Podcast: Why IT and OT Security Priorities 'Don't Translate'Pub date: 2020-08-04Information technology (IT) and operational technology (OT) may have many of the same objectives - but too often they don't see eye-to-eye when it comes to priorities, said Andrew Ginter, VP Industrial Security at Waterfall Security Solutions in this sponsored podcast.The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Threatpost PodcastEpisode: Sponsored Podcast: Security Dangers in Rail SystemsPub date: 2020-07-07Jesus Molina, with Waterfall Security, talks to Threatpost host Cody Hackett about the risks that rail operators are facing - from the security issues in railways to the trains themselves - and how railways can stay up-to-date on the best cybersecurity measures by adopting unidirectional gateways and separating enterprise and operational networks.The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Threatpost PodcastEpisode: The Threatpost Podcast: The Norsk Hydro Cyberattack and Manufacturing SecurityPub date: 2019-03-19Notes from @BEERISAC: CPS/ICS Security Podcast Playlist:Threatpost talks to Phil Neray with CyberX about Tuesday’s ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.Norway-based Norsk Hydro announced on Tuesday morning it was victim to a serious ransomware attack, which has forced the global aluminum producer to shut down or isolate several plants and send several more into manual mode, the company said on Tuesday morning. Threatpost talked to Phil Neray, the VP of Industrial Cybersecurity at CyberX, about how manufacturing firms can avoid a similar cyberattack that Norsk Hydro has undergone. The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Threatpost PodcastEpisode: The Threatpost Podcast: Bitcoin Mining on OT NetworksPub date: 2018-07-31On this week's Threatpost Podcast show, we sit down with Ronen Rabinovich from Cyberbit to discuss bitcoin mining on operational technology and critical infrastructure networks. The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Threatpost PodcastEpisode: The Threatpost Podcast: How to Secure Industrial Control SystemsPub date: 2018-07-25Threatpost's Lindsey O'Donnell talks to PAS CEO Eddie Habibi about the cybersecurity risks that large manufacturing companies face today - especially with the emergence of industrial IoT. The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: The Threatpost PodcastEpisode: FireEye's Marina Krotofil On Triton and ICS ThreatsPub date: 2018-03-12At the Security Analyst Summit this year in Cancun, FireEye's Marina Krotofil talks about the Triton malware, first disclosed in December 2017, that targets industrial control systems. Krotofil discusses with Threatpost's Lindsey O'Donnell about the implications of this malware for the manufacturing market as a whole.The podcast and artwork embedded on this page are from Mike Mimoso, Chris Brook, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Dennis Fisher sits down with Fahmida Rashid, Mike Mimoso, and Jessy Irwin at the RSA Conference in San Francisco to talk about the major themes of the conference.
Verodin CTO Colby DeRodeff talks to Mike Mimoso about his company's new Threat Actor Assurance Program and partnership with Flashpoint. DeRodeff explains the need for threat intelligence to support an examination and evaluation of an enterprise's security controls against advanced and commodity malware and exploits.
The Electronic Frontier Foundation has been an advocate for encrypting not only web-based connections between clients and webservers, but for encrypting all internet traffic. Dr. Jeremy Gillula, tech projects director for the EFF, joins Mike Mimoso for a discussion about the technologies and directions required to ensure that encryption of internet traffic is the default moving forward. In this podcast, you'll hear about how industry collaboration led to the development and growth of Let's Encrypt, a CA distributing free SSL certificates, as well as how mainstream awareness of surveillance post-Snowden is driving adoption of encryption technology. Finally, Jeremy and Mike discuss how email, server, and DNS encryption are the next hills to climb in this effort to secure all internet traffic.
Dennis Fisher speaks with Mike Mimoso of Threatpost about the arrest of security researcher Marcus Hutchins in connection with the Kronos banking trojan, the effect that the incident could have on the cooperation between researchers and law enforcement, and what else may come out of the AlphaBay dark wen market takedown. Music by Chris Gonsalves and…
Dennis Fisher speaks with Mike Mimoso of Threatpost about the arrest of security researcher Marcus Hutchins in connection with the Kronos banking trojan, the effect that the incident could have on the cooperation between researchers and law enforcement, and what else may come out of the AlphaBay dark wen market takedown. Music by Chris Gonsalves and…
Black Hat 2017 was an adventure, as it always is, and to help make sense of it all, Dennis Fisher sat down with friends from across the security community for a long conversation. The discussion with Robert Hansen, Jessy Irwin, Jennifer Leggio of Flashpoint, Mike Mimoso of Threatpost, Patrick Gray of Risky Business, and Fahmida…
Black Hat 2017 was an adventure, as it always is, and to help make sense of it all, Dennis Fisher sat down with friends from across the security community for a long conversation. The discussion with Robert Hansen, Jessy Irwin, Jennifer Leggio of Flashpoint, Mike Mimoso of Threatpost, Patrick Gray of Risky Business, and Fahmida…
Dennis Fisher talks with Mike Mimoso of Threatpost about the Shadowbrokers’ subscription service, who might actually pay for it, what the reaction in Washington is, and what else might be lurking in the group’s cache of stolen tools. Then they discuss the OneLogin breach and its potential fallout as well as the active-defense bill that’s…