As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Automotive Cyber Security Podcasts
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading

1
Automotive HPC Security Challenges and Solutions - Ep 22
22:14
22:14
Play later
Play later
Lists
Like
Liked
22:14With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant sing…
…
continue reading

1
Ep. 30 - Google Cloud Next Recap - Security, AI Solutions
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16Opening Summary: In this episode, Brad Bussie and Mark Aksel unpack the key security takeaways from Google Cloud Next 2025. From AI-powered threat detection to innovative SecOps integrations and game-changing cyber insurance developments, this episode gives enterprise security leaders the insights they need to stay ahead. Topics Covered: Google’s U…
…
continue reading

1
Inside the Truck Cyber Threat – PlaxidityX Ep 21
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
…
continue reading

1
Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
…
continue reading

1
Dynamic SBOM for Smarter Vehicle Security – PlaxidityX Ep 19
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
…
continue reading

1
Platform-Based Automotive Cybersecurity – PlaxidityX Ep 18
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles. We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability sc…
…
continue reading

1
ISO 21434 Compliance in Automotive Cybersecurity – PlaxidityX Ep 17
17:16
17:16
Play later
Play later
Lists
Like
Liked
17:16As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, de…
…
continue reading

1
Hacking A PSP-like Car Key Registration Device – PlaxidityX Ep 16
11:25
11:25
Play later
Play later
Lists
Like
Liked
11:25Touted as an off-the-shelf solution for key fob programming, a mysterious PSP-like Car Key Registration Device promises to sidestep traditional authorization channels. In this episode, we share how the PlaxidityX team simulated various car responses to test whether the device truly mirrored official protocols. They recount the odd mix of user-frien…
…
continue reading

1
Memory Protection Unit: Is It Secure Enough? – PlaxidityX Ep 15
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07Have you ever wondered how microcontrollers in vehicles manage memory access behind the scenes? This episode sheds light on the Memory Protection Unit, an essential yet sometimes overlooked hardware layer designed to stop unauthorized reads, writes, and execution. We revisit fundamental principles—like differentiating between the Core MPU (CMPU) an…
…
continue reading

1
AI's Role in Automotive Cyber Security – PlaxidityX Ep 4
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges. Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophistic…
…
continue reading

1
Vehicle (IDS) Intrusion Detection System Manager – PlaxidityX Ep 14
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis. In this episode, we will explore ho…
…
continue reading

1
Preventing CAN Injection Car Theft – PlaxidityX Ep 13
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56The rise of CAN injection car theft has introduced a new level of sophistication to vehicle hacking, allowing thieves to access the CAN bus. In this episode, we discuss how this technique allows hackers to tap into the CAN bus through exposed wiring, sending fake messages that bypass security measures and immobilizers. The impact of these attacks e…
…
continue reading

1
Keyless Entry Systems Security – PlaxidityX Ep 12
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Keyless entry systems, once considered the pinnacle of vehicle convenience, are now a major target for hackers and car thieves. In today’s episode, we’ll explore the vulnerabilities in Remote and Passive Keyless Entry (RKE/PKE) systems, focusing on how replay, relay, and roll jam attacks exploit their weaknesses. We break down these attack methods,…
…
continue reading

1
EV Charging Security Vulnerability – PlaxidityX Ep 11
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a s…
…
continue reading

1
MitM Attacks on SOME/IP Protocol - PlaxidityX Ep 10
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety. We outline the attack setup, flow, and the…
…
continue reading

1
Industry Leaders Reimagine Vehicle Security – PlaxidityX Ep 9
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39In this episode, we explore how industry leaders PlaxidityX, CyberArk, Device Authority, and Microsoft have joined forces to pioneer the next generation of automotive and mobility security solutions. With new regulatory mandates like UNECE WP.29 and ISO 21434 on the horizon, the automotive industry requires a holistic approach to securing vehicles …
…
continue reading

1
Motorcycle UNR 155 Security Regulations – PlaxidityX Ep 8
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09The motorcycle industry is facing a new challenge: automotive cybersecurity. This episode explores how UNR 155, initially designed for passenger vehicles, now includes motorcycles, scooters, and high-speed e-bikes. We’ll discuss what this regulation means, why it’s happening, and how it could reshape the two-wheeler market as manufacturers scramble…
…
continue reading

1
Eviden & PlaxidityX Partner on MDR Service – PlaxidityX Ep 7
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39Learn how PlaxidityX’s automotive expertise and Eviden’s MDR capabilities combine to create an end-to-end solution for vehicle security. This episode covers the benefits of establishing a dedicated Vehicle SOC (VSOC), an emerging necessity in the industry to monitor, detect, and respond to cyber-attacks in real time. We'll discuss the importance of…
…
continue reading

1
Smart Homes and Connected Cars – PlaxidityX Ep 6
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07The connected car and smart home ecosystems are on a collision course, bringing convenience and innovation, but also creating serious cybersecurity concerns. This episode delves into what happens when cars and homes start talking to each other, thanks to new collaborations like Samsung and Hyundai's initiative. We’ll look at the benefits, like vehi…
…
continue reading

1
Automating Cyber Security Risk Assessment – PlaxidityX Ep 5
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10As vehicles become more connected, cyber security risks grow, making effective risk management a priority in the automotive sector. In this episode, we explore Threat Analysis and Risk Assessment (TARA) in automotive cyber security, and why automating this process is essential to keep pace with evolving threats and regulatory requirements. We’ll al…
…
continue reading

1
ECU Cyber Security: SELinux & Host Protection – PlaxidityX Ep 3
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48As the automotive industry moves toward software-defined vehicles, ensuring the security of ECUs is paramount. ECUs handle critical vehicle functions, and with their increasing connectivity, they are more vulnerable to cyber attacks. SELinux is a trusted solution for managing access control in Linux-based systems, including ECUs, but on its own, it…
…
continue reading
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
…
continue reading

1
EP. 29 - Unlocking the Future of Google SecOps: Automation, AI, and the Evolution of SIEM
35:20
35:20
Play later
Play later
Lists
Like
Liked
35:20In this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions. Topics Covered: The evolution of Google SecOps and the role of Chronicle and…
…
continue reading

1
Customizing Your Car with UDVs – PlaxidityX Ep 1
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33In this episode of the Plaxidity X automotive cybersecurity podcast, Cars, Hackers, & Cybersecurity, we explore the groundbreaking transition from Software Defined Vehicles (SDVs) to User Defined Vehicles (UDVs) and what it means for the automotive industry. Modern vehicles are no longer just machines—they are customizable digital platforms, allowi…
…
continue reading

1
EP 28: AI is Moving Fast in Business—Security Teams Need to Move Faster
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this…
…
continue reading

1
Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue In this episode of "The State of Enterprise IT Security," Brad Bussie, Chief Information Security Officer at e360, is joined by Erin Carpenter, Sr. Director of Digital Marketing. They dive deep into the recent CrowdStrike incident, discussing its implications and broader c…
…
continue reading

1
Ep 26: Crime Reporter Identities Leaked, Cybersecurity Concerns in Automotive, Untrained Users Weaken Defense
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31In this episode of the State of Enterprise IT Security Edition, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics affecting today's cybersecurity landscape. Topics Covered: Data Breach in Baltimore: The identities of residents who reported crimes were leaked, highlighting severe risks to privacy and public saf…
…
continue reading

1
Ep. 25: Top Risks for CISOs in 2024, Recovering from AI Initiative Failures, and Benefits of Tuning Threat Intelligence to Your Business
22:41
22:41
Play later
Play later
Lists
Like
Liked
22:41In this episode of The State of Enterprise IT Security, Brad Bussie dives into the crucial aspects and risks of being a Chief Information Security Officer (CISO). Explore why AI initiatives often fail and learn how to tailor threat intelligence to your business vertical for enhanced security. Topics Covered: Risks involved with being a Chief Inform…
…
continue reading

1
EP 24: Healthcare Edition: Securing Patient Data, AI vs. Traditional Cybersecurity, IoT Challenges in Healthcare
18:57
18:57
Play later
Play later
Lists
Like
Liked
18:57In this FAQ-style episode of the State of Enterprise IT Security Podcast, Brad Bussie answers key questions in healthcare - securing patient data, the pros and cons of AI-based cybersecurity tools versus traditional methods, and how to tackle the complex challenges of securing IoT devices in patient care. Tune in to gain valuable insights that can …
…
continue reading

1
Ep. 23: Healthcare Edition: Hidden Costs of Upgrading Legacy Systems, Top Cybersecurity Solutions, Common Cybersecurity Challenges
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19Healthcare organizations face a unique set of cybersecurity challenges, from protecting patient privacy under regulations like HIPAA to managing the hidden costs of upgrading legacy systems. In this episode, Brad Bussie dives into these critical issues and offers actionable insights for healthcare providers. Topics Covered: Hidden Costs of Upgradin…
…
continue reading

1
Ep. 22: Zoom Preps Post-Quantum Encryption, Rockwell: ICS Devices & Cyber Threats, Thwarted cyberattack at Library of Congress
12:48
12:48
Play later
Play later
Lists
Like
Liked
12:48In this episode, Brad Bussie covers three crucial topics in the realm of cybersecurity. Zoom is gearing up for a quantum future with post-quantum encryption, Rockwell advises disconnecting internet-facing industrial control systems due to rising cyber threats, and the Library of Congress successfully thwarts a cyberattack using multi-factor authent…
…
continue reading

1
S1 EP. 21 Security Expertise Gap, U.S. Pumps $50mm into Better Healthcare Cyber Resilience, YouTube Latest Phishing Battleground
14:03
14:03
Play later
Play later
Lists
Like
Liked
14:03In this episode, Brad Bussie discusses the critical gap in cybersecurity expertise, the U.S. government's $50 million investment to bolster healthcare cyber resilience, and the emerging threat of YouTube as the latest phishing battleground. Stay tuned to uncover the latest insights and expert analysis on these pressing issues in the world of IT sec…
…
continue reading

1
S1 EP. 20 Google's Multilayered Cloud Defense and SecOps Innovations
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Join Brad Bussie, Chief Information Security Officer at e360, as he explores Google's innovative approach to cloud security in today's episode. Focusing on how Google has revolutionized security operations with a multilayered defense strategy, Brad discusses the integration of AI and threat intelligence to enhance cybersecurity measures in the clou…
…
continue reading

1
S1 EP. 19: New CISA Guidelines, Kaiser Data Leak, Okta Credential Stuffing Attacks
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42In Episode 19 of The State of Enterprise IT Security, Brad Bussie tackles critical issues affecting the cybersecurity landscape. From new CISA guidelines aimed at protecting critical U.S. infrastructure to major data leaks impacting millions, this episode dives deep into the challenges and strategies for securing our digital world. Topics Covered: …
…
continue reading

1
S1 EP. 18 Building a Cyber Resilience Vault with Zerto, Discssions with Zerto Global Field CTO Shariq Aqil
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58In this episode, Brad Bussie, Chief Information Security Officer at e360, is joined by Shariq Aqil, Field CTO from Zerto, an HPE company. They delve into the critical topic of building a cyber resilience vault, providing valuable insights into creating robust defenses against cyber threats. Topics Covered: Introduction to Cyber Resiliency: Definiti…
…
continue reading

1
S1 EP. 17: United Healthcare Post-Attack Update, Cloud Security Investments, Brad's Thoughts on AI tools Hume & HeyGen.
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55Brad Bussie, Chief Information Security Officer at e360, hosts the State of Enterprise IT Security Edition podcast, where he delves into three main topics aimed at making IT security more approachable for technology leaders. The first segment reflects on the aftermath of a ransomware attack on United Health and Change Healthcare, highlighting the s…
…
continue reading

1
EP. 01: GenAI turns security landscape on its head, risks of unused identities, and ransomware attacks surge
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Navigating Emerging Threats and Innovations in IT Security In this episode of the State of Enterprise IT Security Edition, host Brad Bussie discusses three main topics relevant to technology leaders today. Firstly, he addresses the growing adoption of Multi-Factor Authentication (MFA) and its vulnerabilities, including MFA fatigue, SIM swapping, an…
…
continue reading

1
S1 EP. 16: Attackers bypass MFA, U.S. Gov’t Goes After Russian Hackers in Microsoft Case, Google Next Highlights
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Navigating the Complex Landscape of IT Security: MFA, Russian Hackers, and Google's Innovation This video explores the current state of enterprise IT security, emphasizing the widespread adoption of multi-factor authentication (MFA) and its vulnerabilities, including MFA fatigue, SIM swapping, and session cookie theft. It discusses a recent emergen…
…
continue reading

1
S1 EP. 15: Hotel Check-In Kiosk Exposes Room Access Codes, Microsoft Introduces Red Team Augmentation, AT&T Breach
21:24
21:24
Play later
Play later
Lists
Like
Liked
21:24In the 15th episode of the State of Enterprise IT Security Edition, Brad Bussie, the Chief Information Security Officer at e360, discusses critical vulnerabilities and innovations within the IT security landscape. The episode covers a range of topics from a security breach at a budget hotel chain, Microsoft's AI-driven red team augmentation, to the…
…
continue reading

1
S1 EP. 14 CISA Alert on SharePoint Server Attacks, Chinese Hacking Plot Exposed, Ray AI Framework Under Siege
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30In the 14th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over CISA Alert on SharePoint Server Attacks, Chinese Hacking Plot Exposed, Ray AI Framework Under Siege and more. Timestamps: [00:01:10] CISA warns that hackers are actively attacking a SharePoint server vulnerability [00:03:30…
…
continue reading

1
S1 EP. 13: Credo AI's Risk Management, OT Cyberattack Impact, Atlassian's Critical Patch
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44In the 13th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over Credo AI's Risk Management, OT Cyberattack Impact, Atlassian's Critical Patch and more. Timestamps: [00:57.3] - Credo AI's Risk Management [04:13.6] - OT Cyberattack Impact [08:04.7] - Atlassian's Critical Patch Don't miss …
…
continue reading

1
S1 EP. 12: House Votes to Ban TikTok, AI Regulated by EU, Cars Tracking and Reporting Driving Habits and more
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16In the 12th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over the House voting to ban TikTok, The EU regulating AI, and modern cars tracking and reporting driving habits and more. Timestamps: [00:01:00] The House Bans TikTok - A bill passed by the U.S. House could lead to a TikTok ban…
…
continue reading

1
S1 EP. 11: Change Healthcare Ransomware Payment, Apple’s Update for Zero-Day Attacks, CrowdStrike CEO on Cyber Criminals Leveling Up
18:05
18:05
Play later
Play later
Lists
Like
Liked
18:05In the 11th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, the Change Healthcare ransomware attack, the importance of Apple’s latest iOS update, and how AI is revolutionizing cybersecurity tactics. Timestamps: [00:54] - [07:56] Change Healthcare Ransomware Attack: [08:00] - [10:27] Apple Blu…
…
continue reading

1
S1 EP. 10: Chinese Hacking Documents, Vending Machine Face Image Database, NIST Releases Version 2.0
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55In this episode of "State of Enterprise IT Security Edition," host Brad Bussey, Chief Information Security Officer at e360, discusses key issues in cybersecurity, focusing on recent developments that provide insight into state surveillance, privacy concerns, and updates to cybersecurity frameworks. Episode Highlights: [00:00-05:12] An insider leak …
…
continue reading

1
S1 EP. 09: International Hackers Using OpenAI, Audio Deepfake Detection Tool, Biden Administration's AI Executive Order
17:33
17:33
Play later
Play later
Lists
Like
Liked
17:33In episode nine of the State of Enterprise IT Security podcast, host Brad Bussie, Chief Information Security Officer at E360, covers the utilization of open AI systems by hackers from nations like China and Russia for cyberattacks, the introduction of Pindrop's real-time audio deep fake detection tool named Pindrop Pulse, and the potential implicat…
…
continue reading

1
S1 EP. 08: Google Fosters AI in Cybersecurity, AI-Generated Election Trickery, and Shadow AI
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26In this episode of the State of Enterprise IT Security podcast, Brad Bussie gets into the rapidly evolving landscape of artificial intelligence (AI) within the realm of cybersecurity. The episode covers three critical topics: Google's initiatives to incorporate AI in cybersecurity, the collective efforts of tech giants to mitigate AI-generated elec…
…
continue reading

1
S1 EP. 07: MIT PhD Student Hacks Apple Vision Pro, Chlorox Cyberattack, CloudFlare Security Incident
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29In this episode of the State of Enterprise IT Security podcast, Brad Bussie dives into pressing cybersecurity topics that technology leaders can't afford to miss. With his expert insight, Brad unpacks a recent discovery by an MIT Ph.D. student of a critical vulnerability in the Apple Vision Pro, explores the aftermath and lessons learned from Cloro…
…
continue reading

1
S1 EP. 06: Ivanti Patches Zero-Days, Confirms New Exploit, China Threat Targets Critical Infrastructure, Congress Confronts Security with Hill’s AI use
19:12
19:12
Play later
Play later
Lists
Like
Liked
19:12In this insightful episode of the State of Enterprise IT Security, host Brad Bussie, Chief Information Security Officer at e360, explores pressing cybersecurity issues affecting businesses and governments. Brad brings his expertise to the forefront, discussing significant topics ranging from Ivanti's latest patches for zero-day vulnerabilities to t…
…
continue reading

1
S1 EP. 05: Facebook Monitoring Users, 26 Billion Record Data Leak, Microsoft Security Breac
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03🔒 Are you safeguarding your digital identity? Tune in to Episode 5 of the State of Enterprise IT Security podcast where Brad Bussie, e360's Chief Information Security Officer, navigates the intricate web of digital security. 📌 Topics Covered Facebook's Data Monetization: Explore how Facebook monitors user activities, sharing data with thousands of …
…
continue reading

1
S1 EP. 04: ChatGPT Team Licenses, ChatGPT Store Risks, Have I been Pwned?
26:41
26:41
Play later
Play later
Lists
Like
Liked
26:41In the 4th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics that are shaping the landscape of technology and security: Topics Covered OpenAI's New Team Feature. Chat GPT Store Introduction Have I Been Pwned? Timestamps: 01:44 Teams Option for Privacy 06:58 Intro…
…
continue reading