מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
Welcome to Your Network’s Edge by RAD, where innovation meets connectivity. This podcast highlights how RAD’s technologies are empowering businesses and service providers. In every episode, we provide in-depth insights into the world of IoT, 5G, network Edge, and AI-powered networking, showcasing how RAD’s solutions empower service providers and critical infrastructure operators to stay ahead. Whether you’re a communications service provider, an industrial IoT professional, or someone passio ...
…
continue reading

1
Liora Shimoni former Deputy Dir. @state Comptroller Audit Division on cyber auditing
43:53
43:53
Play later
Play later
Lists
Like
Liked
43:53משרד מבקר המדינה הוא גוף הביקורת הגדול בישראל עם כמות עצומה של נושאים בהם הוא נדרש לטפל. נושא הסייבר הפך להיות נושא מהותי לאור אין ספור המתקפות כנגד גופי מדינה והניסיון להשבית מערכות של גופי ממשל, בריאות, ביטחון ועוד. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את ליאורה שמעוני לשעבר סגנית מבקר המדינה ומ…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
Orit Benvenisti partner & CEO @Tigbur Group about how to build cyber culture & "raise the walls"
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12לאורך כל הריאיון היה ברור שמדובר בזן אחר של מנכ"ל עם גישה שונה, ניהול חברה המעסיקה עשרות אלפי מועסקים, כ-700 עובדי מנהלה ב-40 סניפים מחד, והרצון להבין מאידך, יוצרים תמהיל לא פשוט לכול הנהלה והעומדת בראשה. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את אורית בנבנישתי שותפה ומנכ"ל קבוצת תיגבור בשיחה על ראי…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
IoT Meetup #4: Mati Epstein Head of IoT & ICS Tech Sales @Checkpoint on IoT Security and Enforcement
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17האם מכשירי האיי.או.טי שלך מאובטחים? אכיפה אוטומטית עם למידת מכונה מרצה: מתי אפשטיין, ראש מכירות טכנולוגיות האיי.או.טי ואיי.סי.אס , צ'ק פוינט ההרצאה זו מתמקדת באבטחת "מכשירים מחוברים" - אכיפה! בהנחה שמכשירי האיי.או.טי ואיי.סי.אס פגיעים, קלים לפריצה ומקור לתנועה רוחבית זדונית ברשתות איי.טי ואוו.טי, צ'ק פוינט יוצרת באופן אוטונומי (ואוטומטי) מדיניות אב…
…
continue reading

1
PP058: Network Discovery with NMAP: You’ve Got Swaptions
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
…
continue reading

1
Identity, AI, and the Unseen Threats in Healthcare Cybersecurity – with vCISO Jason Taule
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51Healthcare IoT systems are increasingly targeted by cyber threats, necessitating a shift in strategy from isolated, organization-specific responses to a collaborative, ecosystem-wide approach. James McCarthy sits down with vCISO and 30-year information assurance and cybersecurity veteran Jason Taule. Taule brings important insights into the challen…
…
continue reading

1
Aviv Madmon Founder and CEO @Experda about Data/AI/Cyber and everything in-between & mindset change
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09דאטה, בעולם שבו כמויות המידע מכפילות את עצמן כמעט על בסיס יומי ומשמשות אבן יסוד בהתנהלות הארגונית הצורך בכלי ניתוח הולך וגובר ומהווה לעיתים נקודת חולשה בהגנת הסייבר של הארגון. נחשון פינקו מארח את אביב מדמון מקים שותף ומנכ"ל אקספרדה בשיחה על דאטה, מאגרי מידע, כלי ניתוח ואיך לצמצם סיכונים ומשטחי תקיפה לנכס החשוב ביותר בארגון. עד כמה אנחנו מבינים את ח…
…
continue reading

1
PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
…
continue reading

1
Guy Hochman CEO @Genie computing Services on October 7th: a scenario no Risk Management expected
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23פרק חובה לכול מנהל ואיש מקצוע בתחום מערכות המידע השביעי באוקטובר הוא הטראומה הגדולה ביותר שחוותה מדינת ישראל מאז היוסדה, רבות דובר וידובר בנושא אך יש זווית שונה של התמודדות מקצועית של חברת אינטגרציה שלקוחותיה היו הקיבוצים והתעשייה שהותקפה בעוטף עזה. איך מתמודדים עם תרחיש שלא נלקח בחשבון בשום ניהול סיכונים נחשון פינקו מארח את גיא הוכמן המנכ"ל של ג'י…
…
continue reading
On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and... Read more »…
…
continue reading

1
PP055: News Roundup – BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant …
…
continue reading

1
The Wild West of IoT: Hacking and Securing Devices with Matt Brown
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30Matt Brown, Hardware Security Researcher, Bug Bounty Hunter, and Founder of Brown Fine Security, leaves nothing to the imagination in this conversation with host Eric Johansen on the world of embedded devices and cybersecurity. Matt shares his journey from childhood tinkering to professional vulnerability research, offering insights into the comple…
…
continue reading

1
Tiko Gadot, CEO @Israel Ports Company in a conversation about cyber from the CEO point of view
1:11:51
1:11:51
Play later
Play later
Lists
Like
Liked
1:11:51איך רואה מנכ"ל את נושא הסייבר בחברה גדולה ומשמעותית המוגדרת כתשתית קריטית? עו"ד הדס תמם בן אברהם ונחשון פינקו מארחים את טיקו גדות המנכ"ל של חברת נמלי ישראל (חנ"י) בשיחה על אתגרי הסייבר מהזווית העסקית וקבלת החלטות בדרגי ההנהלה והדירקטוריון. כמה צריך להשקיע בסייבר ביטוח סייבר כן או לא איך צריכים אנשי המקצוע לשקף סייבר להנהלה ועוד How does a CEO view …
…
continue reading

1
PP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of ove…
…
continue reading

1
PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)
42:47
42:47
Play later
Play later
Lists
Like
Liked
42:47On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and.…
…
continue reading

1
Managers talk cyber S1-E1: Kfir Azoulay CEO & Co-Founder @Solveo on Business Email Compromise (BEC)
51:48
51:48
Play later
Play later
Lists
Like
Liked
51:48הפרק הראשון של הפודקאסט "מנהלים מדברים סייבר" "הונאות מנהלים" היא התקפה של הנדסה חברתית דרך דואר אלקטרוני. כאשר התוקף מזייף הודעת דואר אלקטרוני כדי להערים על הקורבן לבצע פעולה כלשהי, לרוב, העברת כסף לחשבון או למיקום שבשליטת התוקף עו"ד הדס בן אברהם ונחשון פינקו מארחים את כפיר אזולאי חוקר הונאות סייבר, מנכ"ל ומייסד משותף בסולביאו בנושא הונאות מנהלים …
…
continue reading

1
PP052: The State of the Network Security Market In 2025
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a... Rea…
…
continue reading

1
PP051: Security Certifications From Beginner to Advanced
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan...…
…
continue reading

1
The Symbiosis of Tech and Nature: Securing Agriculture with Bill Lucas
42:53
42:53
Play later
Play later
Lists
Like
Liked
42:53In this episode, host Eric Johansen welcomes Bill Lucas, Senior Director of Cybersecurity at Mastronardi Produce, to explore the evolving security challenges in agricultural IoT. With over sixteen years of experience across the automotive, healthcare, and tech industries, Bill brings a deep understanding of enterprise risk management, endpoint secu…
…
continue reading

1
Human Learning Versus Artificial General Intelligence with Ananta Nair, Artificial Intelligence Engineer at Dell Technologies
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17This episode features an interview between Bill Pfeifer and Ananta Nair, Artificial Intelligence Engineer at Dell Technologies, where she leads AI and ML software initiatives for large enterprises. Ananta discusses differences between human learning and AI models, highlighting the complexities and limitations of current AI technologies. She also to…
…
continue reading

1
PP050: Understanding–and Protecting Yourself From–the Malware Economy
42:40
42:40
Play later
Play later
Lists
Like
Liked
42:40There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and …
…
continue reading

1
PP049: CSMM – A Practical Model for Improving Your Cloud Security
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity…
…
continue reading

1
The Evolution and Future of Data Centers with John Bonczek, Chief Revenue Officer of fifteenfortyseven Critical Systems Realty
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13How have data centers evolved and how will we adapt to meet modern data storage demands? In this episode Bill sits down with John Bonczek, Chief Revenue Officer of fifteenfortyseven Critical Systems Realty, a leading developer of highly interconnected, custom-designed data centers. They discuss the impact of AI on power and cooling requirements and…
…
continue reading

1
PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More
39:08
39:08
Play later
Play later
Lists
Like
Liked
39:08JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »…
…
continue reading
What did 2024 teach us about securing the IoT and OT landscape? In this special 2024 lookback episode, Alex Nehmy, Asia Pacific CTO at Phosphorus, revisits impactful moments from industry experts and IoT Security Podcast guests, including Jason Taule, Patrick Gillespie, Sean Tufts, Michael Lester, Joel Goins, Khris Woodring, Mike Holcomb, and John …
…
continue reading

1
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, parti…
…
continue reading

1
Part-3 IoT Meetup 050125: Nachshon Pincu SVP @NIAtech cyber security on -“Phygital” the future of IoT
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36נחשון פינקו מדבר על "פיגיטל", העתיד של מיזוג פיזי עם דיגיטל. אילו גורמים מובילים תעשיות וספקים בכיוון זה היכן ומתי היא תפגוש מומחי סייבר ותפעול רמה טכנית - 100 (קלה) Nachshon Pincu talks about The future of blending physical with digital. What factors lead industries and vendors in this direction? Where and when will it meet cyber and operational e…
…
continue reading

1
Part-2 IoT Meetup 050125: Nimrod Luria Co-Founder & CTO@IO01 on Testing Security for Embedded Device
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24The second recording from the first IoT meetup occurred on January 5th, 2025. This section reviews an IP camera's security, attack, and protection from the protocol level to the firmware. Technical Level - 300By Nachshon Pincu
…
continue reading

1
Part-1: IoT Meetup 05/01/2025 Chen Gruber SW Dev Embedded Security @CheckPoint: Firmware Security
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48Chen Gruber, software developer Embedded Security @CheckPoint about Firmware Security What can hackers learn by extracting data from the file system of the loT Device? Binary scan and static analysis on firmware can give valuable insights into your device and expose the hidden vulnerabilities and weaknesses before hackers find them. In this session…
…
continue reading

1
Tracking the Tour de France: Data and AI on the Road with Shahid Ahmed, EVP for New Ventures and Innovations at NTT
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31How does the Tour de France collect data and provide real time stats to viewers? Shahid Ahmed, EVP for New Ventures and Innovations at NTT, argues that the work they do to track the Tour de France is the ultimate edge use case. He also dives into small AI models and localized data at the edge, as well as educating for the future of jobs in tech. --…
…
continue reading

1
PP046: IPv6 Security, Migration, and Adoption
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about... Read more »…
…
continue reading

1
PP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our gues…
…
continue reading

1
Transforming Retail with AI and Edge Computing with Omar El Gohary, Vice President and General Manager of IoT Solutions at ServiceNow
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31How are AI and edge computing revolutionizing the retail industry? In this episode, Bill sits down with Omar El Gohary, Vice President and General Manager of IoT Solutions at ServiceNow. Omar shares how AI and edge computing are transforming retail by optimizing operational efficiencies and reshaping customer experiences. He also delves into the …
…
continue reading

1
A PLC Might Say "Oh No": Unlocking Comprehensive Asset Visibility with Enrique Martinez
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19In this episode, host and xIoT security evangelist John Vecchi sits down with Enrique Martinez, OT/IoT Practice Lead at World Wide Technology (WWT), to explore the critical challenges and solutions in securing OT and IoT environments. Enrique shares his journey into cybersecurity, highlights the importance of asset visibility, and discusses how AI …
…
continue reading

1
RAD DDoS Protection at the Network Edge - Ep 3
8:17
8:17
Play later
Play later
Lists
Like
Liked
8:17DDoS attacks are becoming increasingly sophisticated, presenting a significant threat to organizations of all sizes. In this Your Network’s Edge: The RAD Way episode, we explore the trends driving these attacks and the evolving methods to counteract them. From traditional detection methods to the latest AI-powered innovations, we outline the streng…
…
continue reading

1
Ilan Gendelman co-founder & CTO @SIGA Multi-Layer OT Cybersecurity on OT cyber defense next gen
1:03:20
1:03:20
Play later
Play later
Lists
Like
Liked
1:03:20פתרון האבטחת הסייבר של סיגה למערכות תפעוליות ייחודי בזיהוי התקפות סייבר בסביבות טכנולוגיות תפעוליות. בעוד שספקי מערכות זיהוי מתקפות סייבר בסביבות תפעוליות (IDS) מסורתית התמקדו בניטור הרשת, סיגה מבדילה את עצמה על ידי ניטור אותות ישירות מהתקני קלט/פלט (I/O) רמה 0 בהיררכיית מערכות הבקרה התעשייתיות נחשון פינקו מארח את אילן גנדלמן מייסד-שותף והמנהל הטכנ…
…
continue reading

1
Sharon Brizinov Director of Research @Claroty (Team82) finding OT variabilities before the attacker
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09קבוצה82 היא אחת מקבוצות מחקר הסייבר המוערכות בעולם, המחקרים שלהם משפיעים על יצרנים ועולם הסייבר למערכות תפעוליות בכלל ולא רק. נחשון פינקו מארח את שרון בריזינוב דירקטור מחקר בחברת קלארוטי וראש קבוצת82 בשיחה על סייבר בעולמות התפעולים, איומים, תוקפים וכול מה שביניהם. מה ההבדל בין מחקר סייבר בעולמות הדאטה וסביבות תפעוליות כיצד מגיבים יצרנים למחקרים ועו…
…
continue reading

1
RAD End-to-End IoT: Laying Connected Architecture - Ep 2
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14In this RAD Your Network’s Edge episode, we examine the critical role of IoT-enabled monitoring in complex, large-scale environments. We focus on three specific use cases—data centers, cell towers, and transmission towers — to understand how comprehensive secure monitoring solutions enhance visibility and efficiency. By providing timely data and pr…
…
continue reading

1
Ohad Zaidenberg former Head of Intel @InBev Researcher & Forbes 30 under 30 about cyber Intelligence
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07מודיעין סייבר הוא חלק בלתי נפרד משכבות ההגנה הנדרשות בכול ארגון, מודיעין איכותי מאפשר לדייק את הכנה למתקפה צפויה עד למניעה. נחשון פינקו מארח את אוהד זינדנברג לשעבר ראש מחלקת מודיעין סייבר בחברת יצור הבירות הגדולה בעולם איי.ביי אינבוו. ומי שנבחר ע"י פורבס להיות מה 30 המובילים מתחת לגיל 30 בשיחה על מודיעין סייבר איך הפך אוהד להיות האויב כמעט מספר אחד…
…
continue reading

1
Global Implementation of Edge AI Technologies with Paul Savill, Global Practice Leader of Networking and Edge Compute at Kyndryl
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03In this episode, Bill sits down with Paul Savill, Global Practice Leader of Networking and Edge Compute at Kyndryl, a company that builds and modernizes the world's critical technology systems. Paul provides insights on the cultural challenges between IT and OT teams, the implementation of edge computing across industries, and innovative use cases …
…
continue reading

1
PP044: Optimizing Security and Performance with ADEM and App Acceleration (Sponsored)
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path—including the home user network, first mile and last mile, and the WAN. On today’s Packet Protector, we learn how ADEM can complement your network and security …
…
continue reading

1
Strategies for Industrial Resilience: Insights from Mark Mattei
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode, Mark Mattei, Global Director of Industrial Managed Security Services at 1898 & Company, unpacks the high-stakes challenges of protecting vital systems from sophisticated attacks. Host John Vecchi highlights the critical issues surrounding IoT and OT security within industrial critical infrastructure. From the importance of cybersec…
…
continue reading

1
Osher Assor CEO of Cyber & Tech Division @Auren IL on the "Beepers attach" & cyber defense tech
49:41
49:41
Play later
Play later
Lists
Like
Liked
49:41האם ניתן להגדיר את מתקפת הביפרים על החיזבאללה כמתקפת סייבר? הנושא פותח דיון שעוסק בהיבטי סייבר רבים ומשמעותיים. נחשון פינקו מארח את אושר עשור שותף מנהל חטיבת הסייבר בפירמת הייעוץ הבינלאומית אוריין בשיחה מרתקת שמתחילה במתקפת הביפרים וזורמת לטכנולוגיות הגנה, גיוס מומחים בסייבר ועוד Can the pager attack on Hezbollah be defined as a cyber attack? The t…
…
continue reading

1
PP043: The Perils and Perks of the CISO Track
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technic…
…
continue reading

1
פרק מס' 3 בסדרת "מוצאים עבודה" – איך מתכוננים לראיונות, חידושים בראיונות של מעסיקים, חוזים וטיפים
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30חזרת ממילואים ומצאת את עצמך בלי עבודה ופרנסה קבועה רוצה להיכנס להייטק או כול תחום אחר כג'וניור רוצה להחליף מקום עבודה כסיניור רוצה לעשות שינוי כיוון בקריירה שלך סדרת הפודקאסטים הזו נועדה עבורך נחשון פינקו מארח את דפנה הר-לבן מנהלת קשרי הייטק בקריה האקדמית אונו ומנהלת מחלקת גיוסים בעברה. בתפקידה הנוכחי דפנה מסייעת לסטודנטים במכללה במציאת עבודה. הפוד…
…
continue reading

1
RAD SD-IoT: The Future of Network Connectivity - Ep 1
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10From factories to industrial vehicles, IoT enables a new era of operational efficiency and data communications. In this episode of Your Network’s Edge podcast by RAD, we explore how software-defined IoT, or SD-IoT, addresses the unique challenges of operational technology (OT) networks, ensuring continuous operations and uninterrupted service. Even…
…
continue reading

1
The Current State of AI and How it Will Impact Society with Ed Henry, Distinguished Engineer Artificial Intelligence at Dell
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32In this episode, we dive into the current state of AI and its future ramifications for society with Ed Henry, Distinguished Engineer - Artificial Intelligence at Dell and an expert with over 18 years in the tech industry. In a conversation that weaves between science and philosophy, Bill and Ed discuss the challenges of model drift, the societal im…
…
continue reading

1
PP042: CISO Liability Insurance, A Seriously Dangerous Menu Hack, and more Security News
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45Our monthly news roundup discusses liability insurance for CISOs (if you are one, you should get it), serious intrusions of US telecom companies by Chinese state actors (according to the FBI), and a novel attack that leapt across multiple Wi-Fi networks. We also discuss significant vulnerabilities affecting Palo Alto Networks’ Expedition migration …
…
continue reading

1
Building a Bridge Across the Divide: The Intersection of IT and OT Cybersecurity with Mike Holcomb
51:21
51:21
Play later
Play later
Lists
Like
Liked
51:21Emphasizing the importance of collaboration and communication, Mike Holcomb shares his extensive experience and practical insights into securing ICS and IoT environments. Holcomb, ICS/OT cybersecurity global lead at Fluor, stresses mastering basic cybersecurity fundamentals and asset inventory, along with the nuances of integrating IT and OT securi…
…
continue reading