Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Automotive Cyber Security Podcasts

show episodes
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Loading …
show series
 
With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant sing…
  continue reading
 
Opening Summary: In this episode, Brad Bussie and Mark Aksel unpack the key security takeaways from Google Cloud Next 2025. From AI-powered threat detection to innovative SecOps integrations and game-changing cyber insurance developments, this episode gives enterprise security leaders the insights they need to stay ahead. Topics Covered: Google’s U…
  continue reading
 
With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
  continue reading
 
In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
  continue reading
 
In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
  continue reading
 
In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles. We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability sc…
  continue reading
 
As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, de…
  continue reading
 
Touted as an off-the-shelf solution for key fob programming, a mysterious PSP-like Car Key Registration Device promises to sidestep traditional authorization channels. In this episode, we share how the PlaxidityX team simulated various car responses to test whether the device truly mirrored official protocols. They recount the odd mix of user-frien…
  continue reading
 
Have you ever wondered how microcontrollers in vehicles manage memory access behind the scenes? This episode sheds light on the Memory Protection Unit, an essential yet sometimes overlooked hardware layer designed to stop unauthorized reads, writes, and execution. We revisit fundamental principles—like differentiating between the Core MPU (CMPU) an…
  continue reading
 
This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges. Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophistic…
  continue reading
 
Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis. In this episode, we will explore ho…
  continue reading
 
The rise of CAN injection car theft has introduced a new level of sophistication to vehicle hacking, allowing thieves to access the CAN bus. In this episode, we discuss how this technique allows hackers to tap into the CAN bus through exposed wiring, sending fake messages that bypass security measures and immobilizers. The impact of these attacks e…
  continue reading
 
Keyless entry systems, once considered the pinnacle of vehicle convenience, are now a major target for hackers and car thieves. In today’s episode, we’ll explore the vulnerabilities in Remote and Passive Keyless Entry (RKE/PKE) systems, focusing on how replay, relay, and roll jam attacks exploit their weaknesses. We break down these attack methods,…
  continue reading
 
Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a s…
  continue reading
 
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety. We outline the attack setup, flow, and the…
  continue reading
 
In this episode, we explore how industry leaders PlaxidityX, CyberArk, Device Authority, and Microsoft have joined forces to pioneer the next generation of automotive and mobility security solutions. With new regulatory mandates like UNECE WP.29 and ISO 21434 on the horizon, the automotive industry requires a holistic approach to securing vehicles …
  continue reading
 
The motorcycle industry is facing a new challenge: automotive cybersecurity. This episode explores how UNR 155, initially designed for passenger vehicles, now includes motorcycles, scooters, and high-speed e-bikes. We’ll discuss what this regulation means, why it’s happening, and how it could reshape the two-wheeler market as manufacturers scramble…
  continue reading
 
Learn how PlaxidityX’s automotive expertise and Eviden’s MDR capabilities combine to create an end-to-end solution for vehicle security. This episode covers the benefits of establishing a dedicated Vehicle SOC (VSOC), an emerging necessity in the industry to monitor, detect, and respond to cyber-attacks in real time. We'll discuss the importance of…
  continue reading
 
The connected car and smart home ecosystems are on a collision course, bringing convenience and innovation, but also creating serious cybersecurity concerns. This episode delves into what happens when cars and homes start talking to each other, thanks to new collaborations like Samsung and Hyundai's initiative. We’ll look at the benefits, like vehi…
  continue reading
 
As vehicles become more connected, cyber security risks grow, making effective risk management a priority in the automotive sector. In this episode, we explore Threat Analysis and Risk Assessment (TARA) in automotive cyber security, and why automating this process is essential to keep pace with evolving threats and regulatory requirements. We’ll al…
  continue reading
 
As the automotive industry moves toward software-defined vehicles, ensuring the security of ECUs is paramount. ECUs handle critical vehicle functions, and with their increasing connectivity, they are more vulnerable to cyber attacks. SELinux is a trusted solution for managing access control in Linux-based systems, including ECUs, but on its own, it…
  continue reading
 
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
  continue reading
 
In this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions. Topics Covered: The evolution of Google SecOps and the role of Chronicle and…
  continue reading
 
In this episode of the Plaxidity X automotive cybersecurity podcast, Cars, Hackers, & Cybersecurity, we explore the groundbreaking transition from Software Defined Vehicles (SDVs) to User Defined Vehicles (UDVs) and what it means for the automotive industry. Modern vehicles are no longer just machines—they are customizable digital platforms, allowi…
  continue reading
 
In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this…
  continue reading
 
Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue In this episode of "The State of Enterprise IT Security," Brad Bussie, Chief Information Security Officer at e360, is joined by Erin Carpenter, Sr. Director of Digital Marketing. They dive deep into the recent CrowdStrike incident, discussing its implications and broader c…
  continue reading
 
In this episode of the State of Enterprise IT Security Edition, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics affecting today's cybersecurity landscape. Topics Covered: Data Breach in Baltimore: The identities of residents who reported crimes were leaked, highlighting severe risks to privacy and public saf…
  continue reading
 
In this episode of The State of Enterprise IT Security, Brad Bussie dives into the crucial aspects and risks of being a Chief Information Security Officer (CISO). Explore why AI initiatives often fail and learn how to tailor threat intelligence to your business vertical for enhanced security. Topics Covered: Risks involved with being a Chief Inform…
  continue reading
 
In this FAQ-style episode of the State of Enterprise IT Security Podcast, Brad Bussie answers key questions in healthcare - securing patient data, the pros and cons of AI-based cybersecurity tools versus traditional methods, and how to tackle the complex challenges of securing IoT devices in patient care. Tune in to gain valuable insights that can …
  continue reading
 
Healthcare organizations face a unique set of cybersecurity challenges, from protecting patient privacy under regulations like HIPAA to managing the hidden costs of upgrading legacy systems. In this episode, Brad Bussie dives into these critical issues and offers actionable insights for healthcare providers. Topics Covered: Hidden Costs of Upgradin…
  continue reading
 
In this episode, Brad Bussie covers three crucial topics in the realm of cybersecurity. Zoom is gearing up for a quantum future with post-quantum encryption, Rockwell advises disconnecting internet-facing industrial control systems due to rising cyber threats, and the Library of Congress successfully thwarts a cyberattack using multi-factor authent…
  continue reading
 
In this episode, Brad Bussie discusses the critical gap in cybersecurity expertise, the U.S. government's $50 million investment to bolster healthcare cyber resilience, and the emerging threat of YouTube as the latest phishing battleground. Stay tuned to uncover the latest insights and expert analysis on these pressing issues in the world of IT sec…
  continue reading
 
Join Brad Bussie, Chief Information Security Officer at e360, as he explores Google's innovative approach to cloud security in today's episode. Focusing on how Google has revolutionized security operations with a multilayered defense strategy, Brad discusses the integration of AI and threat intelligence to enhance cybersecurity measures in the clou…
  continue reading
 
In Episode 19 of The State of Enterprise IT Security, Brad Bussie tackles critical issues affecting the cybersecurity landscape. From new CISA guidelines aimed at protecting critical U.S. infrastructure to major data leaks impacting millions, this episode dives deep into the challenges and strategies for securing our digital world. Topics Covered: …
  continue reading
 
In this episode, Brad Bussie, Chief Information Security Officer at e360, is joined by Shariq Aqil, Field CTO from Zerto, an HPE company. They delve into the critical topic of building a cyber resilience vault, providing valuable insights into creating robust defenses against cyber threats. Topics Covered: Introduction to Cyber Resiliency: Definiti…
  continue reading
 
Brad Bussie, Chief Information Security Officer at e360, hosts the State of Enterprise IT Security Edition podcast, where he delves into three main topics aimed at making IT security more approachable for technology leaders. The first segment reflects on the aftermath of a ransomware attack on United Health and Change Healthcare, highlighting the s…
  continue reading
 
Navigating Emerging Threats and Innovations in IT Security In this episode of the State of Enterprise IT Security Edition, host Brad Bussie discusses three main topics relevant to technology leaders today. Firstly, he addresses the growing adoption of Multi-Factor Authentication (MFA) and its vulnerabilities, including MFA fatigue, SIM swapping, an…
  continue reading
 
Navigating the Complex Landscape of IT Security: MFA, Russian Hackers, and Google's Innovation This video explores the current state of enterprise IT security, emphasizing the widespread adoption of multi-factor authentication (MFA) and its vulnerabilities, including MFA fatigue, SIM swapping, and session cookie theft. It discusses a recent emergen…
  continue reading
 
In the 15th episode of the State of Enterprise IT Security Edition, Brad Bussie, the Chief Information Security Officer at e360, discusses critical vulnerabilities and innovations within the IT security landscape. The episode covers a range of topics from a security breach at a budget hotel chain, Microsoft's AI-driven red team augmentation, to the…
  continue reading
 
In the 14th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over CISA Alert on SharePoint Server Attacks, Chinese Hacking Plot Exposed, Ray AI Framework Under Siege and more. Timestamps: [00:01:10] CISA warns that hackers are actively attacking a SharePoint server vulnerability [00:03:30…
  continue reading
 
In the 13th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over Credo AI's Risk Management, OT Cyberattack Impact, Atlassian's Critical Patch and more. Timestamps: [00:57.3] - Credo AI's Risk Management [04:13.6] - OT Cyberattack Impact [08:04.7] - Atlassian's Critical Patch Don't miss …
  continue reading
 
In the 12th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over the House voting to ban TikTok, The EU regulating AI, and modern cars tracking and reporting driving habits and more. Timestamps: [00:01:00] The House Bans TikTok - A bill passed by the U.S. House could lead to a TikTok ban…
  continue reading
 
In the 11th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, the Change Healthcare ransomware attack, the importance of Apple’s latest iOS update, and how AI is revolutionizing cybersecurity tactics. Timestamps: [00:54] - [07:56] Change Healthcare Ransomware Attack: [08:00] - [10:27] Apple Blu…
  continue reading
 
In this episode of "State of Enterprise IT Security Edition," host Brad Bussey, Chief Information Security Officer at e360, discusses key issues in cybersecurity, focusing on recent developments that provide insight into state surveillance, privacy concerns, and updates to cybersecurity frameworks. Episode Highlights: [00:00-05:12] An insider leak …
  continue reading
 
In episode nine of the State of Enterprise IT Security podcast, host Brad Bussie, Chief Information Security Officer at E360, covers the utilization of open AI systems by hackers from nations like China and Russia for cyberattacks, the introduction of Pindrop's real-time audio deep fake detection tool named Pindrop Pulse, and the potential implicat…
  continue reading
 
In this episode of the State of Enterprise IT Security podcast, Brad Bussie gets into the rapidly evolving landscape of artificial intelligence (AI) within the realm of cybersecurity. The episode covers three critical topics: Google's initiatives to incorporate AI in cybersecurity, the collective efforts of tech giants to mitigate AI-generated elec…
  continue reading
 
In this episode of the State of Enterprise IT Security podcast, Brad Bussie dives into pressing cybersecurity topics that technology leaders can't afford to miss. With his expert insight, Brad unpacks a recent discovery by an MIT Ph.D. student of a critical vulnerability in the Apple Vision Pro, explores the aftermath and lessons learned from Cloro…
  continue reading
 
In this insightful episode of the State of Enterprise IT Security, host Brad Bussie, Chief Information Security Officer at e360, explores pressing cybersecurity issues affecting businesses and governments. Brad brings his expertise to the forefront, discussing significant topics ranging from Ivanti's latest patches for zero-day vulnerabilities to t…
  continue reading
 
🔒 Are you safeguarding your digital identity? Tune in to Episode 5 of the State of Enterprise IT Security podcast where Brad Bussie, e360's Chief Information Security Officer, navigates the intricate web of digital security. 📌 Topics Covered Facebook's Data Monetization: Explore how Facebook monitors user activities, sharing data with thousands of …
  continue reading
 
In the 4th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics that are shaping the landscape of technology and security: Topics Covered OpenAI's New Team Feature. Chat GPT Store Introduction Have I Been Pwned? Timestamps: 01:44 Teams Option for Privacy 06:58 Intro…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play