Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
The EY Academy Podcast is designed for third level students. It is a platform to provide further insight from a business perspective on what you are learning in the classroom. Professors and Lectures from colleges around the country submit questions and experts within our business answer them. Its casual, in a relaxed format and hopefully really informative. Coming soon – The EY Career Hub where we advise students on everything from what a graduate programme is to how to perform great at int ...
…
continue reading

1
How to fast-track the UK Cyber Governance Code of Practice using IASME Cyber Assurance
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Implementing the UK Cyber Governance Code of Practice with IASME Cyber Assurance In this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response,…
…
continue reading
In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security…
…
continue reading

1
DEF CON's Noob Village: Creating Space for Cybersecurity Beginners
22:00
22:00
Play later
Play later
Lists
Like
Liked
22:00Send us a text Ready to break down the intimidating barriers of cybersecurity conferences? Join us for an eye-opening conversation with Josh Mason, a former Air Force pilot and cyber warfare officer who's on a mission to make the industry more accessible to newcomers. Josh shares his personal journey from military service into the cybersecurity fie…
…
continue reading

1
Unpacking the UK Cyber Governance Code of Practice
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40Tune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation. By listening, you will gain insights into: • Why cyber governance is essential for modern businesses and orga…
…
continue reading

1
Mentorship, Connection, and Playing the Long Game
26:32
26:32
Play later
Play later
Lists
Like
Liked
26:32Send us a text Discover how to navigate the complex landscape of cybersecurity careers with Fletus Poston III, Senior Manager for Security Operations at Crash Plan. Drawing from his diverse background spanning regulated utilities, financial services, and software development since 2007, Fletus shares transformative insights about finding your place…
…
continue reading

1
Autonomous ships, cyber security and the workboat code
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
…
continue reading

1
From Abacus to Agentic AI: How Technology is Transforming Our Security Landscape with FedX
28:31
28:31
Play later
Play later
Lists
Like
Liked
28:31Send us a text Ever wonder how cutting-edge AI is transforming cybersecurity from the inside out? Security analyst Federico "FedEx" Castro pulls back the curtain on how innovative professionals are leveraging artificial intelligence to revolutionize threat detection and response. FedEx takes us into the fascinating world of custom GPT agents, showi…
…
continue reading

1
The Quantum Revolution and the death of encryption
14:38
14:38
Play later
Play later
Lists
Like
Liked
14:38Is your organisation ready for the quantum revolution? This episode delves into the looming threat of quantum computing to current cybersecurity, explaining how powerful quantum computers could break widely used encryption like RSA and ECC, potentially by the early to mid-2030s. Understand the "harvest now, decrypt later" attacks that could expose …
…
continue reading
Passwords are out, and passkeys are in! But what exactly are passkeys, and why should business leaders care? In this episode, we break down passkeys in plain English—no tech jargon, just clear and practical insights. You'll learn: ✅ What passkeys are and how they work ✅ Why they’re more secure (and easier) than passwords ✅ How passkeys can protect …
…
continue reading

1
From Hard Hats to Firewalls: Why Cyber Safety is the Next Big Construction Risk
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53🔹 Episode Overview: For decades, the construction industry has made physical safety a top priority. Over time, mental well-being has also been recognised as a critical part of workplace safety. But now, a new challenge is emerging—one that many construction businesses aren’t prepared for: Cyber Safety. In this episode, we discuss the findings of ou…
…
continue reading

1
Cyber Essentials - all the changes coming in 2025
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10Join Trish and Tom as they explain what the UK Cyber Essentials scheme is, how it will benefit your business and the changes coming to the scheme from April 2025. Whether you already have Cyber Essentials and will need to renew after the changes come into effect or are considering going for the certification for the first time - this is essential l…
…
continue reading

1
CTF Chronicles: Unpacking Our Wild West Hackin' Fest Experience
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44Send us a text Dive into our exhilarating adventure at Wild West Hackin' Fest, where our casual visit transformed into a thrilling Capture the Flag (CTF) competition! Join us as we share our journey from team formation to victory, highlighting the unique dynamics of working as a group in high-pressure scenarios. In this episode, we discuss the prep…
…
continue reading

1
Cyber CTF Adventures: Black Badge and Priceless Lessons
22:50
22:50
Play later
Play later
Lists
Like
Liked
22:50Send us a text Welcome to the Security Chipmunks podcast where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it. Step into the exhilarating world of cybersecurity competitions with our latest episode as we dive…
…
continue reading
If your business processes card payment transactions you need to be PCI-DSS compliant. This episode provides an introduction to PCI-DSS and along the way explains many key cyber security concepts that apply to all businesses. This podcast episode discusses PCI DSS, a global information security standard for organisations that handle branded credit …
…
continue reading

1
The EU AI Act - what does it mean for your business?
9:32
9:32
Play later
Play later
Lists
Like
Liked
9:32The EU has passed the world’s first comprehensive law on Artificial Intelligence (AI): The AI Act. This groundbreaking legislation aims to ensure the safe, ethical, and transparent use of AI within the EU, impacting businesses in the UK and globally. Key Takeaways for Business Leaders: Understanding Risk Categories: The AI Act categorises AI system…
…
continue reading

1
Cyber Security for Charities - what trustees and managers need to know
13:19
13:19
Play later
Play later
Lists
Like
Liked
13:19This episode explains Cyber Essentials, a UK government-backed scheme that helps charities protect themselves against common cyber attacks. Trustees and leaders are responsible for ensuring their charity's IT systems and data are secure. This is essential for maintaining public trust, protecting beneficiaries, and securing funding. Cyber Essentials…
…
continue reading

1
NCSC Annual Review of 2024 - what business leaders need to know
19:14
19:14
Play later
Play later
Lists
Like
Liked
19:14This episode explores cybersecurity in the UK, examining threats, resilience efforts, and long-term strategies. It draws on the National Cyber Security Centre's (NCSC) 2024 Annual Review. Key Themes: Escalating Cyber Threats: The UK faces a "diffuse and dangerous" cyber threat landscape, with increasing attacks from hostile states (Russia, China, I…
…
continue reading

1
Upcoming Cyber Regulations and Cyber Threats
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25This episode explores the evolving landscape of cybersecurity legislation in the EU and the UK, examining key initiatives aimed at fortifying digital defences against an increasingly sophisticated threat environment. The EU's Cyber Resilience Act, now in force, establishes mandatory cybersecurity standards for all products with digital elements sol…
…
continue reading
Felix and Alex discuss the attack surface and disruption opportunities for a Cyber attack against Santa's Christmas delivery schedule.By You Gotta Hack That
…
continue reading
The Bottom LineCash! We talk about funding cyber security, when you need funding, and top tips on how to secure funding.If you want any cyber security support please get in contact with the team by email [email protected] or visit the website clearcutcyber.comMusic is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA …
…
continue reading
Cyber Essentials - Part 2:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover 8 more tips to achieve CE, including the elements that are not obvious. This advice stems from us advising and supporting compl…
…
continue reading
Cyber Essentials - Part 1:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover what it is, when you might want it, and 2 tips to make gaining CE easier. Part 2 contains 8 more tips, including the elements t…
…
continue reading
How CISOs sleep at night - aka Assurance: The final episode of our special series on risk. Matt, Tom and Toby discuss how you can assure your risks, ensuring your risk understanding and prioritisation is correct, and your mitigation work effectively.If you want any cyber security support please get in contact with the team by email info@clearcutcyb…
…
continue reading
Risking It All: Episode three of four in our special series on risk. Matt and Tom continue their journey through cyber risk management, and talk about how we might go about accepting certain levels of risk. Exercising, threat modelling, and a good communications plan all feature.If you want any cyber security support please get in contact with the …
…
continue reading
Risky Tools and Techniques by Clear Cut Cyber LtdBy Clear Cut Cyber Ltd
…
continue reading
In the first of a four-part series on risk we examine what risk management means in the cyber world, how people get it wrong, and how to solve it. Featuring special guest, and Clear Cut Cyber risk expert, Matt.If you want any cyber security support please get in contact with the team by email [email protected] or visit the website clearcutcybe…
…
continue reading
Learn how to plan cyber incident responseWe explain how to plan for cyber incident response. The elements that make up the plan, the stages that take place during cyber incident response, the key things to do ahead of an incident, and how to learn more.If you want any cyber security support please get in contact with the team by email info@clearcut…
…
continue reading
Most people think of trains and railways as being great big lumps of metal that (hopefully) whizz along long shiny tracks, but it turns out they are incredibly complex and have a broad attack surface! Email Felix using [email protected] Find You Gotta Hack That on X @gotta_hackBy You Gotta Hack That
…
continue reading

1
Vulnerability research into SolaX Inverter Smart Connectivity
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37Felix describes research completed against the SolaX Pocket WiFi module that connects SolaX inverters to the Internet for smart connectivity features. The research highlights some of the challenges experienced by researchers and developers alike as well as the risks that these vulnerabilities present. Email Felix using [email protected] Find You Gotta H…
…
continue reading
What is a CISO?In this episode Toby and Tom are joined by a special guest - Dr Andy Grayland. Andy is an experienced CISO, and currently fills that role for Silobreaker. He joins the team to discuss what a CISO is, what the role entails, when you need one, and what he thinks the most important actions and skills are for a new CISO.If you want any c…
…
continue reading
In this episode Felix looks at the complexities and attack surface of modern cars. They may have become more sophisticated but are they now technologically fragile? Email Felix using [email protected] Find You Gotta Hack That on X @gotta_hackBy You Gotta Hack That
…
continue reading
Security assessmentsIn this episode Toby and Tom discuss what security assessments are, different types of assessment, and how they are conducted. They also talk through some of the assessments they have conducted.If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com. Including free cyber secu…
…
continue reading
From Function to Fortification: identifying and securing critical business functionsIn this episode Toby and Tom discuss why understanding business impact is key to context for any cyber security programme, and a process for working it out.If you want any cyber security support please get in contact with the team via the website: https://clearcutcy…
…
continue reading
Felix analyses the security within modern smart-prosthetics and medical tech to help prevent the need for amputations. The security need behind these two devices is not always immediately apparent because some people might think of it as being 'boring medical data'. Cyber security concerns are still there none-the-less, just in a slightly different…
…
continue reading
Felix delves in the technology that supports MRI scanners, X-Ray machines and CT scanners and looks at the vulnerabilities they have had in the past as well as potential opportunities for them to fall foul of attackers. The technology here focuses on the DICOM and HL7 protocols both of which have had security concerns but are used globally to ensur…
…
continue reading
Wearable tech is increasingly popular with consumers worldwide. It's become a class of tech that is so ubiquitous that privacy and cyber security concerns have to be taken seriously. In this episode we look at the Bluetooth Low Energy (BLE) protocol which makes the vast majority of this technology possible. Email Felix using [email protected] Find You G…
…
continue reading
In this episode Felix investigates Glucose Monitors. He looks at their cyber security profile and discusses Near Field Communications (NFC) which is a commonly used protocol to communicate between smart phones and the little device. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack…
…
continue reading
Felix looks at the slightly murky history of the cyber security behind insulin pumps. These devices have a bad security reputation, but, it isn't that straight forward. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hackBy You Gotta Hack That
…
continue reading
Pacemakers are surprising prevalent and have been around for years. These devices keep people alive but have a difficult cyber security history. Felix looks at how these devices work and what security challenges they face. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading

1
The IoT and embedded systems penetration testing process
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Felix discusses what makes a good penetration testing process, the difficulties that are unique to the Internet of Things and embedded systems, and how best to approach getting good security assurance. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading
CCTV systems have a bad reputation when it comes to cyber security. Felix looks at the attack surface of CCTV systems and discusses how these systems are more complex than most people realise and how that results in them being abused. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading
Felix looks at the types of Occupancy Sensors typically used in lighting management and intruder alarm systems. The most common sensor type is the Passive Infra Red (PIR) sensors. These are primitive in some ways but very sophisticated in others. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading
Felix looks in depth at the cyber security implications of fire systems in modern buildings. This particularly focuses on the BACnet protocol - a common element of modern open-protocol systems. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comBy You Gotta Hack That
…
continue reading
It is easy to take lifts and escalators for granted, but it turns out that modern versions have a huge amount of connectivity. We delve into all this tech and focus on one type of communications used in modern lilfts and escaltors, called ModBus. We discuss how ModBus might be attacked, especially when thinking about all the other technologies that…
…
continue reading
Felix delves into RFID door locks and examines a small portion of the cyber security issues in this space. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comBy You Gotta Hack That
…
continue reading

1
Pioneering change in tech - an interview with Dame Stephanie Shirley, CH
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19In this episode, we are joined by one of the UKs most celebrated and inspirational businesswomen - entrepreneur and venture philanthropist, Dame Stephanie Shirley, CH. Shaped by her experiences as a child refugee, fleeing Nazi Vienna for the UK without her parents at the age of five, Dame Shirley vowed to make her life one worth saving. In the earl…
…
continue reading
We take a look at how Building Management Systems (BMS) are setup and the huge range of cyber security issues that can be present. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comBy You Gotta Hack That
…
continue reading
Felix opens two smart plugs and discusses the security of what he finds. This continues the theme from previous episodes of electricity generation, management, and usage to show how many different angles an attacker could choose to affect our day-to-day lives. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottaha…
…
continue reading

1
Delayed attacks against Realtek chips you'll find everywhere
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems. The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CVE-2021-35395. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack you…
…
continue reading
Felix looks at the system that supports the solar panels at home and where it might be weak to cyber attack. Warning though, don't play with electrics unless you know what you are doing! Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comBy You Gotta Hack That
…
continue reading