Podcast Episodes
Back to SearchOperational Technology for Dummies
Episode 5
From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical…
11 months, 2 weeks ago
OT’s Hidden Cyber Risks
Episode 5
From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cyberse…
11 months, 3 weeks ago
Zero Trust Starts Here
Episode 5
Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business.
In step one of Zero Trus…
11 months, 4 weeks ago
Zero Trust Demystified: What is Zero Trust Really About?
Episode 5
Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever …
1 year ago
Inside Volt Typhoon: China’s Silent Cyber Threat
Episode 5
What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, …
1 year ago
Cybercrime-as-a-Service: The Disney+ of the Dark Web
Episode 5
Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is rea…
1 year ago
Inside the Dark Web Economy: $10 for Your Identity & Corporate Access?
Episode 5
The Dark Web Economy: Hacks for $10?
Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode …
1 year ago
Why Precision Time Matters in Cybersecurity | PTP vs NTP Explained
Episode 5
⏳ What happens when time goeswrong?
Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to …
1 year, 1 month ago
Why SSL Decryption Matters
Episode 5
Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that faili…
1 year, 1 month ago
Intrusion Kill Chain: Stop Playing Defense with Rick Howard
Season 2 Episode 5
Cybersecurity shouldn’t always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieu…
1 year, 1 month ago