Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
Tech for Leaders

Mazars in the UK

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
  continue reading
 
Artwork

1
EY Academy

EY Ireland Podcast Network

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The EY Academy Podcast is designed for third level students. It is a platform to provide further insight from a business perspective on what you are learning in the classroom. Professors and Lectures from colleges around the country submit questions and experts within our business answer them. Its casual, in a relaxed format and hopefully really informative. Coming soon – The EY Career Hub where we advise students on everything from what a graduate programme is to how to perform great at int ...
  continue reading
 
Loading …
show series
 
Implementing the UK Cyber Governance Code of Practice with IASME Cyber Assurance In this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response,…
  continue reading
 
In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security…
  continue reading
 
Send us a text Ready to break down the intimidating barriers of cybersecurity conferences? Join us for an eye-opening conversation with Josh Mason, a former Air Force pilot and cyber warfare officer who's on a mission to make the industry more accessible to newcomers. Josh shares his personal journey from military service into the cybersecurity fie…
  continue reading
 
Tune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation. By listening, you will gain insights into: • Why cyber governance is essential for modern businesses and orga…
  continue reading
 
Send us a text Discover how to navigate the complex landscape of cybersecurity careers with Fletus Poston III, Senior Manager for Security Operations at Crash Plan. Drawing from his diverse background spanning regulated utilities, financial services, and software development since 2007, Fletus shares transformative insights about finding your place…
  continue reading
 
In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
  continue reading
 
Send us a text Ever wonder how cutting-edge AI is transforming cybersecurity from the inside out? Security analyst Federico "FedEx" Castro pulls back the curtain on how innovative professionals are leveraging artificial intelligence to revolutionize threat detection and response. FedEx takes us into the fascinating world of custom GPT agents, showi…
  continue reading
 
Is your organisation ready for the quantum revolution? This episode delves into the looming threat of quantum computing to current cybersecurity, explaining how powerful quantum computers could break widely used encryption like RSA and ECC, potentially by the early to mid-2030s. Understand the "harvest now, decrypt later" attacks that could expose …
  continue reading
 
Passwords are out, and passkeys are in! But what exactly are passkeys, and why should business leaders care? In this episode, we break down passkeys in plain English—no tech jargon, just clear and practical insights. You'll learn: ✅ What passkeys are and how they work ✅ Why they’re more secure (and easier) than passwords ✅ How passkeys can protect …
  continue reading
 
🔹 Episode Overview: For decades, the construction industry has made physical safety a top priority. Over time, mental well-being has also been recognised as a critical part of workplace safety. But now, a new challenge is emerging—one that many construction businesses aren’t prepared for: Cyber Safety. In this episode, we discuss the findings of ou…
  continue reading
 
Join Trish and Tom as they explain what the UK Cyber Essentials scheme is, how it will benefit your business and the changes coming to the scheme from April 2025. Whether you already have Cyber Essentials and will need to renew after the changes come into effect or are considering going for the certification for the first time - this is essential l…
  continue reading
 
Send us a text Dive into our exhilarating adventure at Wild West Hackin' Fest, where our casual visit transformed into a thrilling Capture the Flag (CTF) competition! Join us as we share our journey from team formation to victory, highlighting the unique dynamics of working as a group in high-pressure scenarios. In this episode, we discuss the prep…
  continue reading
 
Send us a text Welcome to the Security Chipmunks podcast where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it. Step into the exhilarating world of cybersecurity competitions with our latest episode as we dive…
  continue reading
 
If your business processes card payment transactions you need to be PCI-DSS compliant. This episode provides an introduction to PCI-DSS and along the way explains many key cyber security concepts that apply to all businesses. This podcast episode discusses PCI DSS, a global information security standard for organisations that handle branded credit …
  continue reading
 
The EU has passed the world’s first comprehensive law on Artificial Intelligence (AI): The AI Act. This groundbreaking legislation aims to ensure the safe, ethical, and transparent use of AI within the EU, impacting businesses in the UK and globally. Key Takeaways for Business Leaders: Understanding Risk Categories: The AI Act categorises AI system…
  continue reading
 
This episode explains Cyber Essentials, a UK government-backed scheme that helps charities protect themselves against common cyber attacks. Trustees and leaders are responsible for ensuring their charity's IT systems and data are secure. This is essential for maintaining public trust, protecting beneficiaries, and securing funding. Cyber Essentials…
  continue reading
 
This episode explores cybersecurity in the UK, examining threats, resilience efforts, and long-term strategies. It draws on the National Cyber Security Centre's (NCSC) 2024 Annual Review. Key Themes: Escalating Cyber Threats: The UK faces a "diffuse and dangerous" cyber threat landscape, with increasing attacks from hostile states (Russia, China, I…
  continue reading
 
This episode explores the evolving landscape of cybersecurity legislation in the EU and the UK, examining key initiatives aimed at fortifying digital defences against an increasingly sophisticated threat environment. The EU's Cyber Resilience Act, now in force, establishes mandatory cybersecurity standards for all products with digital elements sol…
  continue reading
 
Cyber Essentials - Part 2:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover 8 more tips to achieve CE, including the elements that are not obvious. This advice stems from us advising and supporting compl…
  continue reading
 
Cyber Essentials - Part 1:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover what it is, when you might want it, and 2 tips to make gaining CE easier. Part 2 contains 8 more tips, including the elements t…
  continue reading
 
How CISOs sleep at night - aka Assurance: The final episode of our special series on risk. Matt, Tom and Toby discuss how you can assure your risks, ensuring your risk understanding and prioritisation is correct, and your mitigation work effectively.If you want any cyber security support please get in contact with the team by email info@clearcutcyb…
  continue reading
 
Risking It All: Episode three of four in our special series on risk. Matt and Tom continue their journey through cyber risk management, and talk about how we might go about accepting certain levels of risk. Exercising, threat modelling, and a good communications plan all feature.If you want any cyber security support please get in contact with the …
  continue reading
 
In the first of a four-part series on risk we examine what risk management means in the cyber world, how people get it wrong, and how to solve it. Featuring special guest, and Clear Cut Cyber risk expert, Matt.If you want any cyber security support please get in contact with the team by email [email protected] or visit the website clearcutcybe…
  continue reading
 
Learn how to plan cyber incident responseWe explain how to plan for cyber incident response. The elements that make up the plan, the stages that take place during cyber incident response, the key things to do ahead of an incident, and how to learn more.If you want any cyber security support please get in contact with the team by email info@clearcut…
  continue reading
 
Felix describes research completed against the SolaX Pocket WiFi module that connects SolaX inverters to the Internet for smart connectivity features. The research highlights some of the challenges experienced by researchers and developers alike as well as the risks that these vulnerabilities present. Email Felix using [email protected] Find You Gotta H…
  continue reading
 
What is a CISO?In this episode Toby and Tom are joined by a special guest - Dr Andy Grayland. Andy is an experienced CISO, and currently fills that role for Silobreaker. He joins the team to discuss what a CISO is, what the role entails, when you need one, and what he thinks the most important actions and skills are for a new CISO.If you want any c…
  continue reading
 
Security assessmentsIn this episode Toby and Tom discuss what security assessments are, different types of assessment, and how they are conducted. They also talk through some of the assessments they have conducted.If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com. Including free cyber secu…
  continue reading
 
From Function to Fortification: identifying and securing critical business functionsIn this episode Toby and Tom discuss why understanding business impact is key to context for any cyber security programme, and a process for working it out.If you want any cyber security support please get in contact with the team via the website: https://clearcutcy…
  continue reading
 
Felix analyses the security within modern smart-prosthetics and medical tech to help prevent the need for amputations. The security need behind these two devices is not always immediately apparent because some people might think of it as being 'boring medical data'. Cyber security concerns are still there none-the-less, just in a slightly different…
  continue reading
 
Felix delves in the technology that supports MRI scanners, X-Ray machines and CT scanners and looks at the vulnerabilities they have had in the past as well as potential opportunities for them to fall foul of attackers. The technology here focuses on the DICOM and HL7 protocols both of which have had security concerns but are used globally to ensur…
  continue reading
 
Wearable tech is increasingly popular with consumers worldwide. It's become a class of tech that is so ubiquitous that privacy and cyber security concerns have to be taken seriously. In this episode we look at the Bluetooth Low Energy (BLE) protocol which makes the vast majority of this technology possible. Email Felix using [email protected] Find You G…
  continue reading
 
Felix discusses what makes a good penetration testing process, the difficulties that are unique to the Internet of Things and embedded systems, and how best to approach getting good security assurance. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
  continue reading
 
Felix looks at the types of Occupancy Sensors typically used in lighting management and intruder alarm systems. The most common sensor type is the Passive Infra Red (PIR) sensors. These are primitive in some ways but very sophisticated in others. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
  continue reading
 
It is easy to take lifts and escalators for granted, but it turns out that modern versions have a huge amount of connectivity. We delve into all this tech and focus on one type of communications used in modern lilfts and escaltors, called ModBus. We discuss how ModBus might be attacked, especially when thinking about all the other technologies that…
  continue reading
 
In this episode, we are joined by one of the UKs most celebrated and inspirational businesswomen - entrepreneur and venture philanthropist, Dame Stephanie Shirley, CH. Shaped by her experiences as a child refugee, fleeing Nazi Vienna for the UK without her parents at the age of five, Dame Shirley vowed to make her life one worth saving. In the earl…
  continue reading
 
Felix opens two smart plugs and discusses the security of what he finds. This continues the theme from previous episodes of electricity generation, management, and usage to show how many different angles an attacker could choose to affect our day-to-day lives. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottaha…
  continue reading
 
Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems. The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CVE-2021-35395. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack you…
  continue reading
 
Loading …
Listen to this show while you explore
Play