Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Automotive Cyber Security Podcasts

show episodes
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Loading …
show series
 
In this episode of Simply Secured, host James Mcquiggan engages in an insightful and entertaining conversation with Dan “The Haircut Fish” Rearden. Dan shares his unconventional journey from various odd jobs and college culinary arts to becoming a SOC analyst. Dan talks about his love for technology, self-guided learning through TryHackMe, and tran…
  continue reading
 
On this week’s episode we chat with Tyson Benson and explore his diverse career as a senior product cybersecurity analyst for ZFI. With a background in patent law, Benson shares his unique insights on the importance of cybersecurity in the automotive industry, particularly as it pertains to software-defined vehicles. Discover the pivotal moments th…
  continue reading
 
Today we chat with Debon Grady, an IT Security Specialist with the South Carolina Department of Mental Health. Debon shares his unique path from music education major to cybersecurity expert, discussing key moments, valuable skills learned, and the importance of mentorship. Discover his thoughts on the relationship between red and blue teams, the s…
  continue reading
 
Today we chat with Cristina Pawlica, a distinguished member of the Simply Cyber community with an extensive background in cybersecurity and military service. Cristina shares her unique journey from serving in the Air Force as a Force Support Officer to pursuing a career in cybersecurity. She delves into crucial leadership lessons and discusses the …
  continue reading
 
Welcome back for Season 2! We kickoff with a graduating senior from Rensselaer Polytechnic University as she transitions from academic research to industry applications in the world of cybersecurity. In this episode, we sit down with Shoshana Sugerman, to explore her journey from classroom to conference room. We delve into Shoshana's work on Grover…
  continue reading
 
In this episode we delve into the world of cybersecurity with Fleetus Poston III, a dynamic public speaker, passionate mentor, and cybersecurity evangelist. Fleetus shares his journey, including his 'aha' moment in cybersecurity, handling imposter syndrome, the significance of a healthy security culture, and the impact of a recent reduction in forc…
  continue reading
 
This week, we chat with Federico Castro, a cybersecurity professional and member of the ISC2 Central Florida chapter, known by his nickname 'FedEx'. We discuss FedX’s transition from physical security and construction into cybersecurity, fueled by his diagnosis of ADHD and his pursuit of education. Federico highlights the importance of networking, …
  continue reading
 
In this wonderful episode with Emmy award winning Kathy Chambers, we explore her fascinating journey as a project manager at Antisyphon Training with Black Hills Information Security. Kathy's unique path from broadcast journalism to cybersecurity offers valuable insights for anyone considering a career transition or looking to leverage their existi…
  continue reading
 
Join us for an exciting episode with Joseph Cadden, aka Casually Joseph, a passionate cybersecurity expert and Palo Alto MDR security analyst. Joseph shares his fascinating journey from building gaming computers in high school to pursuing a master's degree and working in managed detection and response. We explore the importance of certifications, e…
  continue reading
 
In this episode we chat with Brittany White, also known as Bdubzz, a dynamic content creator who is passionate about cybersecurity. She shares her journey from CAD design to a successful career in cybersecurity, highlighting her pivotal 'aha' moment. Brittany elaborates on her efforts in building a home lab and transitioning towards governance, ris…
  continue reading
 
As artificial intelligence becomes an integral part of the automotive ecosystem, its dual nature-both as a powerful security tool and a potential attack vector-demands urgent attention. In this episode of Cars, Hackers, and Cyber Security, we explore how AI is reshaping the threat landscape for connected and autonomous vehicles. Drawing from insigh…
  continue reading
 
Ever wondered how a passion for home brewing could blend seamlessly with a career in cybersecurity? In this episode, we sit down with Ryan Pearson, known to many as "Brews n' Hacks," to explore the fascinating intersection of these two worlds and the valuable lessons they share. Ryan's journey from biology student to cybersecurity professional is a…
  continue reading
 
In this episode, James interviews Luke Canfield, as he shares his path into cybersecurity, which started 20 years ago and was reignited by an interest in hardware tinkering and drones. Luke discusses how he prioritizes vulnerabilities in systems, the significance of writing detailed reports, and the challenges faced in vulnerability management. He …
  continue reading
 
As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack. In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global autom…
  continue reading
 
Elevating Your Cybersecurity Career with Dennis Keefe: From Law Enforcement to OSINT In this week's episode of 'Simply Secured: Elevating Your Cybersecurity Career,' we sit down with Dennis Keefe who transitioned from a decade-long career in law enforcement to becoming a cybersecurity enthusiast with a special focus on open source intelligence (OSI…
  continue reading
 
In this episode, Brad Bussie and field CISO Mark Aksel explore how AI is transforming manufacturing, from predictive maintenance to advanced supply chain strategies. They break down the real impacts of tariffs and share how companies can future-proof operations with smarter AI-driven decisions. ## Topics Covered * Using AI for predictive maintenanc…
  continue reading
 
As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, supplier…
  continue reading
 
As automotive software grows increasingly complex, navigating security and regulatory requirements has become an essential challenge for manufacturers. Today's vehicles, driven by software-defined systems and connected services, must comply with stringent standards while defending against evolving cyber threats. In this episode, we delve deeply int…
  continue reading
 
With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant sing…
  continue reading
 
Opening Summary: In this episode, Brad Bussie and Mark Aksel unpack the key security takeaways from Google Cloud Next 2025. From AI-powered threat detection to innovative SecOps integrations and game-changing cyber insurance developments, this episode gives enterprise security leaders the insights they need to stay ahead. Topics Covered: Google’s U…
  continue reading
 
With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
  continue reading
 
In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
  continue reading
 
In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
  continue reading
 
In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles. We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability sc…
  continue reading
 
As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, de…
  continue reading
 
Touted as an off-the-shelf solution for key fob programming, a mysterious PSP-like Car Key Registration Device promises to sidestep traditional authorization channels. In this episode, we share how the PlaxidityX team simulated various car responses to test whether the device truly mirrored official protocols. They recount the odd mix of user-frien…
  continue reading
 
Have you ever wondered how microcontrollers in vehicles manage memory access behind the scenes? This episode sheds light on the Memory Protection Unit, an essential yet sometimes overlooked hardware layer designed to stop unauthorized reads, writes, and execution. We revisit fundamental principles—like differentiating between the Core MPU (CMPU) an…
  continue reading
 
This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges. Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophistic…
  continue reading
 
Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis. In this episode, we will explore ho…
  continue reading
 
The rise of CAN injection car theft has introduced a new level of sophistication to vehicle hacking, allowing thieves to access the CAN bus. In this episode, we discuss how this technique allows hackers to tap into the CAN bus through exposed wiring, sending fake messages that bypass security measures and immobilizers. The impact of these attacks e…
  continue reading
 
Keyless entry systems, once considered the pinnacle of vehicle convenience, are now a major target for hackers and car thieves. In today’s episode, we’ll explore the vulnerabilities in Remote and Passive Keyless Entry (RKE/PKE) systems, focusing on how replay, relay, and roll jam attacks exploit their weaknesses. We break down these attack methods,…
  continue reading
 
Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a s…
  continue reading
 
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety. We outline the attack setup, flow, and the…
  continue reading
 
In this episode, we explore how industry leaders PlaxidityX, CyberArk, Device Authority, and Microsoft have joined forces to pioneer the next generation of automotive and mobility security solutions. With new regulatory mandates like UNECE WP.29 and ISO 21434 on the horizon, the automotive industry requires a holistic approach to securing vehicles …
  continue reading
 
The motorcycle industry is facing a new challenge: automotive cybersecurity. This episode explores how UNR 155, initially designed for passenger vehicles, now includes motorcycles, scooters, and high-speed e-bikes. We’ll discuss what this regulation means, why it’s happening, and how it could reshape the two-wheeler market as manufacturers scramble…
  continue reading
 
Learn how PlaxidityX’s automotive expertise and Eviden’s MDR capabilities combine to create an end-to-end solution for vehicle security. This episode covers the benefits of establishing a dedicated Vehicle SOC (VSOC), an emerging necessity in the industry to monitor, detect, and respond to cyber-attacks in real time. We'll discuss the importance of…
  continue reading
 
The connected car and smart home ecosystems are on a collision course, bringing convenience and innovation, but also creating serious cybersecurity concerns. This episode delves into what happens when cars and homes start talking to each other, thanks to new collaborations like Samsung and Hyundai's initiative. We’ll look at the benefits, like vehi…
  continue reading
 
As vehicles become more connected, cyber security risks grow, making effective risk management a priority in the automotive sector. In this episode, we explore Threat Analysis and Risk Assessment (TARA) in automotive cyber security, and why automating this process is essential to keep pace with evolving threats and regulatory requirements. We’ll al…
  continue reading
 
As the automotive industry moves toward software-defined vehicles, ensuring the security of ECUs is paramount. ECUs handle critical vehicle functions, and with their increasing connectivity, they are more vulnerable to cyber attacks. SELinux is a trusted solution for managing access control in Linux-based systems, including ECUs, but on its own, it…
  continue reading
 
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
  continue reading
 
In this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions. Topics Covered: The evolution of Google SecOps and the role of Chronicle and…
  continue reading
 
In this episode of the Plaxidity X automotive cybersecurity podcast, Cars, Hackers, & Cybersecurity, we explore the groundbreaking transition from Software Defined Vehicles (SDVs) to User Defined Vehicles (UDVs) and what it means for the automotive industry. Modern vehicles are no longer just machines—they are customizable digital platforms, allowi…
  continue reading
 
In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this…
  continue reading
 
Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue In this episode of "The State of Enterprise IT Security," Brad Bussie, Chief Information Security Officer at e360, is joined by Erin Carpenter, Sr. Director of Digital Marketing. They dive deep into the recent CrowdStrike incident, discussing its implications and broader c…
  continue reading
 
In this episode of the State of Enterprise IT Security Edition, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics affecting today's cybersecurity landscape. Topics Covered: Data Breach in Baltimore: The identities of residents who reported crimes were leaked, highlighting severe risks to privacy and public saf…
  continue reading
 
In this episode of The State of Enterprise IT Security, Brad Bussie dives into the crucial aspects and risks of being a Chief Information Security Officer (CISO). Explore why AI initiatives often fail and learn how to tailor threat intelligence to your business vertical for enhanced security. Topics Covered: Risks involved with being a Chief Inform…
  continue reading
 
In this FAQ-style episode of the State of Enterprise IT Security Podcast, Brad Bussie answers key questions in healthcare - securing patient data, the pros and cons of AI-based cybersecurity tools versus traditional methods, and how to tackle the complex challenges of securing IoT devices in patient care. Tune in to gain valuable insights that can …
  continue reading
 
Healthcare organizations face a unique set of cybersecurity challenges, from protecting patient privacy under regulations like HIPAA to managing the hidden costs of upgrading legacy systems. In this episode, Brad Bussie dives into these critical issues and offers actionable insights for healthcare providers. Topics Covered: Hidden Costs of Upgradin…
  continue reading
 
In this episode, Brad Bussie covers three crucial topics in the realm of cybersecurity. Zoom is gearing up for a quantum future with post-quantum encryption, Rockwell advises disconnecting internet-facing industrial control systems due to rising cyber threats, and the Library of Congress successfully thwarts a cyberattack using multi-factor authent…
  continue reading
 
In this episode, Brad Bussie discusses the critical gap in cybersecurity expertise, the U.S. government's $50 million investment to bolster healthcare cyber resilience, and the emerging threat of YouTube as the latest phishing battleground. Stay tuned to uncover the latest insights and expert analysis on these pressing issues in the world of IT sec…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play