Videos
CSM Podcast: Journal of Cyber Security and Mobility Best Paper 2022
In this Cybersecurity Magazine Podcast, we talk to the best paper author Roman V. Yampolskiy about the paper, the controllability of AI, and the future risks of AI.
CSM Podcast: Conversation with the Editors
In this Cybersecurity Magazine Podcast, three of the Cybersecurity Magazine editors come together to reflect over the first part of 2023.
CSM Podcast: Zero Trust with Tom Madsen
In this Cybersecurity Magazine Podcast, Anand Prasad and Philippa Jefferies talk to Tom Madsen about Zero Trust.
CSM Podcast: Trusted Data Intermediaries
In this Cybersecurity Magazine Podcast, Rajeev Prasad and Philippa Jefferies talk to James Robson, from The Evidence Quarter, to talk about Trusted Data Intermediaries.
CSM Podcast: Quantum Safe Cryptography with Matt Campagna
Matt Campagna, ETSI TC Cyber QSC Chair, Amazon, talks to Philippa Jefferies and Rajeev Prasad about quantum safe cryptography.
CSM Podcast: Looking Ahead to 2023
In our last podcast of the year, the editors of Cybersecurity Magazine look back at all our activities in 2022 as well as ahead to the top cybersecurity trends of 2023!
CSM Podcast: Threat Modelling with Adam Shostack
In this Cybersecurity Magazine Podcast, Han Christian Rudolph talks to leading expert Adam Shostack about threat modelling.
CSM Podcast: Quantum Computing and Other Transformative Technologies with Ahmed Banafa
In this podcast episode, Ahmed Banafa talks to Philippa Jefferies and Rajeev Prasad about his new book on quantum computing and other transformative technologies.
CSM Podcast: The Importance of Standards with Alex Leadbeater
Alex Leadbeater talks to Philippa Jefferies and Hans Christian Rudolph about the role and importance of standards in cybersecurity.
Cybersecurity Magazine Podcast: The Role of Hardware in the Security of AI with Alec Brusilovsky
Alec Brusilovsky talks to Philippa Jefferies about the the ETSI Group Report, ETSI GR SAI 006, on the Role of Hardware in the Security of AI published this year.
Cybersecurity Magazine Podcast July 2022: The Threat of Nation States and The Power Of Information
Philippa Jefferies talks to Philip Ingram to Jonathan Wood about the Threat of Nation States and The Power Of Information.
Cybersecurity Magazine Podcast June 2022: Security in Supply Chains
This month, Philippa Jefferies and Hans Christian Rudolph talk to Jonathan Wood about security in supply chains.
Cybersecurity Magazine Podcast May 2022: Big Safety
In this Cybersecurity Magazine Podcast, Vyacheslav Kharchenko, Coen van Gulijk, Mikhail Yastrebenetsky, and Andrzej Rucinski discuss what Big Safety is, the challenges, and the impact of recent events.
Cybersecurity Magazine Podcast April 2022: Safety in AI with Roman Yampolskiy
In this Cybersecurity Magazine Podcast, Rajeev Prasad and Philippa Jefferies talk to Roman Yampolskiy about safety and security in AI.
Cybersecurity Magazine Podcast March 2022: Privacy Enhancing Technologies with Nigel Smart
In this Cybersecurity Magazine Podcast Anand Prasad and Philippa Jefferies talk to Nigel Smart, KU Leuven, about privacy enhancing technologies.
Cybersecurity Magazine Podcast February 2022: Cybersecurity in 2022 with CSM Editors
In our first editorial podcast of the year, the editors of Cybersecurity Magazine are all here to discuss current issues in cybersecurity, our thoughts for the coming year, and our plans for 2022.
Cybersecurity Magazine Podcast January 2022: AI Detection of Attacks in Automation Systems with Peter Langendörfer
In the first CSM podcast of 2022, Peter Langendörfer, Leibniz Institute for High Performance Microelectronics (IHP), talks to Hans Christian Rudolph and Philippa Jefferies about his work in AI detection of attacks in automation systems.
Cybersecurity Magazine Podcast December 2021: ETSI Test Specification for Secure IoT Consumer Devices
James Deacon, DCMS, talks to Hans Christian Rudolph and Philippa Jefferies about the new ETSI test specification for the ETSI EN 303 645, the world leading consumer IoT security standard.
Cybersecurity Magazine Podcast November 2021: Blockchain and Security
In the latest Cybersecurity Magazine Podcast, Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity.
Cybersecurity Magazine Podcast October 2021: Open-Source Software
In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Sandeep Shukla, C3i Center, IIT Kanpur, about open-source software and its use for cybersecurity.
Cybersecurity Magazine Podcast September 2021: LoRaWAN Security
In the latest editorial podcast from Cybersecurity Magazine, Hans Christian Rudolph and Philippa Jefferies discuss LoRaWAN security with Alper Yegin, Actility, LoRa Alliance.
Cybersecurity Magazine Podcast August 2021: Security Awareness
In the latest editorial podcast from Cybersecurity Magazine, we discuss the importance of security awareness with Jonathan Hiroshi Rossi, Saya University.
Cybersecurity Magazine Podcast July 2021: Managing IT and OT System Security
In the latest podcast, we welcome our new editorial board member Tom Madsen and talk to him about his work in security and how IT and OT systems are becoming more integrated
Cybersecurity Magazine Podcast June 2021: Cybersecurity for 5G and Beyond
In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.
Cybersecurity Magazine Podcast May 2021: Security and Production Systems
In the latest Podcast, we talk to Edgar Weippl, SBA Research, about the security and production system engineering, as well as the upcoming ARES conference (August 17-20, 2021).
Cybersecurity Magazine Podcast April 2021: Smart Grid Security
In the latest Podcast, we talk to Rasmus Løvenstein Olsen, Aalborg University, about the security challenges of smart grids.
Cybersecurity Magazine Editorial Podcast: Open RAN for 5G and it’s role in security
In this editorial podcast, we discuss the concept of Open RAN, what it is and what it means for the security of 5G networks.
Cybersecurity Magazine Editorial Podcast: Overview of 5G Security
In this editorial discussion we give an overview of 5G security and discuss what it means for the future for 5G networks.
Other Podcasts
CSM Podcast: Looking Ahead to 2023
In our last podcast of the year, the editors of Cybersecurity Magazine look back at all our activities in 2022 as well as ahead to the top cybersecurity trends of 2023! We would like to thank all our readers and listeners, and we wish you a fantastic New Year! We will see you in 2023!CSM Podcast: Threat Modelling with Adam Shostack
In this Cybersecurity Magazine Podcast, Han Christian Rudolph talks to leading expert Adam Shostack about threat modelling. They discuss the four questions you need to ask when considering threat modelling, the importance of embedding security into every phase, and the traps that people fall into with threat modelling.CSM Podcast: The Role of Hardware in the Security of AI with Alec Brusilovsky
This month we have a special episode of our Cybersecurity Magazine podcast.
Alec Brusilovsky talks to Philippa Jefferies about the the ETSI Group Report, ETSI GR SAI 006, on the Role of Hardware in the Security of AI published this year.
https://www.etsi.org/deliver/etsi_gr/SAI/001_099/006/01.01.01_60/gr_SAI006v010101p.pdf
They discuss what the group report covers, what vulnerabilities hardware has with regards to attacks on AI, and the possible use of AI for protection of hardware.
CSM Podcast: The Threat of Nation States and The Power Of Information with Philip Ingram
In this Cybersecurity Magazine Podcast Philip Ingram MBE talks to Philippa Jefferies about the threat of nation states and cybersecurity, and the power of information. They also chat about the upcoming 2022 International Cyber Expo which will be held at Olympia London on the 27th – 28th September 2022. International Cyber Expo is where great cybersecurity minds come together to explore the issues of tomorrow’s interconnected world. For tickets: https://ice-2022.reg.buzz/mp For more information visit: https://www.internationalcyberexpo.comCSM Podcast: Big Safety
In this Cybersecurity Magazine podcast, Philippa Jefferies and Hans Christian Rudolph talk to the authors of a forthcoming book on ‘Big Safety’. Vyacheslav Kharchenko, National Aerospace University (KhAI), Coen van Gulijk, University of Huddersfield, Mikhail Yastrebenetsky, State Scientific Technical Center on Nuclear and Radiation Safety, Ukraine, and Andrzej Rucinski, University of New Hampshire, discuss what Big Safety is, the challenges, who is responsible for implementing big safety, and the impact of recent events.CSM Podcast: Privacy Enhancing Technologies with Nigel Smart
In this Cybersecurity Magazine Podcast Anand Prasad and Philippa Jefferies talk to Nigel Smart, KU Leuven, about privacy enhancing technologies. They discuss what privacy for data really means, various privacy enhancing technologies, and advice for those looking to use some of these technologies. They also chat about the upcoming 2022 Privacy-Enhancing Tech Summit which will be held virtually April 5-6, 2022. https://privacy-enhancing-tech-summit-eu.com/events/privacy-enhancing-technology-summit-europeCSM Podcast: AI Detection of Attacks in Automation Systems with Peter Langendörfer
In the first CSM podcast of 2022, Peter Langendörfer, Leibniz Institute for High Performance Microelectronics (IHP), talks to Hans Christian Rudolph and Philippa Jefferies about his work in AI detection of attacks in automation systems. They discuss how AI can be used in the context of cybersecurity, the benefits as well as the limitations, and what kind of attacks AI can help defend against.CSM Podcast – ETSI Test Specification for Secure IoT Consumer Devices with James Deacon
In the last Cybersecurity Magazine podcast of the year, James Deacon, DCMS, talks to Hans Christian Rudolph and Philippa Jefferies about the new ETSI test specification for the ETSI EN 303 645, the world leading consumer IoT security standard.
They discuss what the standard is, who it affects, and the importance of standards for consumer security.
CSM Podcast – Blockchain and Security with Ahmed Banafa
Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity. They discuss what blockchain is, its many applications, and how it can be used to guarantee greater security.Ahmed Banafa is the author of the book ‘Blockchain Technology and Applications’ which explores the fundamentals and applications of Blockchain technology, as well as its relationship with Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation.CSM Podcast – Open-Source Software for Cybersecurity with Sandeep Shukla
In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Sandeep Shukla, C3i Center, IIT Kanpur, about open-source software and its use for cybersecurity. They discuss the importance of open-source software, its benefits and limitations, as well as the best way to find open-source security tools.CSM Podcast – LoRaWAN Security with Alper Yegin
In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Alper Yegin, Actility, LoRa Alliance, about LoRaWAN.
They discuss what LoRaWAN is, the role it plays in the IoT and various use cases, as well as the security built into the network.
CSM Podcast: Managing IT and OT System Security
In the latest Cybersecurity Magazine Podcast, we welcome our new editorial board member Tom Madsen and talk to him about his work in security and how IT and OT systems are “growing together”. We discuss the distinction between OT and IT systems, how they are becoming more integrated together, and the security challenges this can bring.CSM Podcast: Smart Grid Security
In the latest Cybersecurity Magazine Podcast, we talk to Rasmus Løvenstein Olsen, Aalborg University, about his work in security and smart grid. His research at Aalborg University, Denmark, lies in communication and ICT in smart grid and smart grid services, with focus on faults and cyber attack, both detection and mitigation techniques on making grid supply more reliable. In this podcast we discuss the drivers behind smart grid technology, the security and privacy challenges, and how we can do better.Stupid Stuff in Tech
Technology has a lot of wondrous things going on but it has it’s fair share of stupid things as well. We took a moment to look at four of the more stupid things in tech of the past two weeks in the new year.Airgap Networks: an absolute defense?
We talk to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks but don't stop them from happening. Network solutions are too expensive and do little to protect against people doing stupid things behind the firewall. It has really seemed hopeless for a while and very frustrating. Then we ran across Airgap.io It's affordable, scalable, and it stops ransomware from spreading throughout all connected devices in the network.Phisihing threatens US elections
Between January and August 2020, The number of phishing sites detected by Google rose by more than 200,000 to 1,892,980.“When you get that all too familiar barrage of spam emails, social engineers are betting that if you’re a MAGA supporter who received spoofed emails pitching progressive candidates or causes, you’ll click unsubscribe ,” says Adam Levin, founder of Cyberscout. Levin explained that the emails are rigged to download malware, ransomware, or access your accounts when you click unsubscribe." The dramatic increase is giving rise to an entire sub-industry dedicated to zero-trust technologies that are slowly coming to market. Maybe too slowly for the 2020 election cycle. We talked to two of them: Zero Fox and Airgap Networks
BlackHat wrap up, Part 1: How hostile states are hacking elections
Our first re-run of the season is going back to our report on election hacking, a two-parter, that doesn't dwell on the technology of elections as much as how they can be influenced. For several years we have heard about how technologically vulnerable our elections systems are, but it turns out that physically hacking a system is a lot harder and yields insignificant fruit in national elections. It is much easier to sway voters with disinformation.CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond
In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.
We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.
Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.
Drill Down into the EU Toolbox for 5G Security
CSM Podcast – LoRaWAN Security with Alper Yegin
In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Alper Yegin, Actility, LoRa Alliance, about LoRaWAN.
They discuss what LoRaWAN is, the role it plays in the IoT and various use cases, as well as the security built into the network.
CSM Podcast: Security Awareness with Jonathan Hiroshi Rossi
In the latest editorial podcast from Cybersecurity Magazine, we discuss the importance of security awareness with Jonathan Hiroshi Rossi, Saya University.
We talk about what security awareness means, variations in its approach for different countries and cultures, and what can be done to help improve it for better overall security.
CSM Podcast – Blockchain and Security with Ahmed Banafa
Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity. They discuss what blockchain is, its many applications, and how it can be used to guarantee greater security.Ahmed Banafa is the author of the book ‘Blockchain Technology and Applications’ which explores the fundamentals and applications of Blockchain technology, as well as its relationship with Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation.CSM Podcast: AI Detection of Attacks in Automation Systems with Peter Langendörfer
In the first CSM podcast of 2022, Peter Langendörfer, Leibniz Institute for High Performance Microelectronics (IHP), talks to Hans Christian Rudolph and Philippa Jefferies about his work in AI detection of attacks in automation systems. They discuss how AI can be used in the context of cybersecurity, the benefits as well as the limitations, and what kind of attacks AI can help defend against.CSM Podcast: AI Detection of Attacks in Automation Systems with Peter Langendörfer
In the first CSM podcast of 2022, Peter Langendörfer, Leibniz Institute for High Performance Microelectronics (IHP), talks to Hans Christian Rudolph and Philippa Jefferies about his work in AI detection of attacks in automation systems. They discuss how AI can be used in the context of cybersecurity, the benefits as well as the limitations, and what kind of attacks AI can help defend against.CSM Podcast: Quantum Safe Cryptography with Matt Campagna
In this Cybersecurity Magazine Podcast Matt Campagna, ETSI TC Cyber QSC Chair, Amazon, talks to Philippa Jefferies and Rajeev Prasad about quantum safe cryptography. They cover the threats that quantum technologies will pose to security, NIST’s selection of standard post-quantum cryptographic algorithms, and the challenges of widescale adoption.CSM Podcast: Quantum Computing and Other Transformative Technologies with Ahmed Banafa
In this podcast episode, Ahmed Banafa talks to Philippa Jefferies and Rajeev Prasad about quantum computing and its potential impact on communications and cybersecurity.
Ahmed Banafa is the author of the forthcoming book ‘Quantum Computing and Other Transformative Technologies’ which explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet.
https://www.riverpublishers.com/book_details.php?book_id=973
CSM Podcast: The Importance of Standards with Alex Leadbeater
In this Cybersecurity Magazine Podcast Alex Leadbeater talks to Philippa Jefferies and Hans Christian Rudolph about the role and importance of standards in cybersecurity.
They also chat about ETSI’s upcoming flagship Security Conference on the 3rd – 5th October 2022, in ETSI, Sophia Antipolis, France.
CSM Podcast: Security in Supply Chains with Jonathan Wood
This month, Philippa Jefferies and Hans Christian Rudolph talk to Jonathan Wood about security in supply chains. They chat about the security challenges specific to supply chains, how prepared organisations really are, and what can be done to protect your supply chains.CSM Podcast: Safety in AI with Roman Yampolskiy
In this Cybersecurity Magazine Podcast, Rajeev Prasad and Philippa Jefferies talk to Roman Yampolskiy about safety and security in AI. They discuss what safe AI really means, super intelligence, and the security challenges we face with the increased use of AI.CSM Podcast: Security Awareness with Jonathan Hiroshi Rossi
In the latest editorial podcast from Cybersecurity Magazine, we discuss the importance of security awareness with Jonathan Hiroshi Rossi, Saya University.
We talk about what security awareness means, variations in its approach for different countries and cultures, and what can be done to help improve it for better overall security.
CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond
In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.
We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.
Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.
Drill Down into the EU Toolbox for 5G Security
CSM Podcast: Security and Production System Engineering with Edgar Weippl
We talk to Edgar Weippl, SBA Research, University of Vienna, about his work in security and production systems.
We discuss why cyber security is a particular challenge for production system engineering, the impact that increased wireless connectivity in production systems can have, and how the industry can move forward in this area.
We also chat about the upcoming ARES conference (International Conference on Availability, Reliability and Security) which will be held virtually from August 17-20, 2021.
Human Error can still Defeat Cybersecurity tech
As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth is, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.Sometimes, a digital breach just isn't your fault
Even the most security-conscious people and organizations get hacked, so it's not always something you can stop. We go back to talk with #Sectigo's VP of IoT security, Alan Grau to talk about how a security training from got hacked through a common phishing scam, how deep the flaws in our technology are and finally, how Sectigo is helping companies make secure technology.Quantum computing is a security nightmare, but making it safe is a priority for Sectigo
Some people think quantum computers are mostly hype. They are. We won't see them come into real use for a decade. In the meantime, people are freaking out over how they can be used to makes us all less safe. The good news is some companies, like Sectigo, are working on ways to make sure we are all safe when they actually become a reality. So grab a coffee and listen to our take on quantum computer security.BlackHat wrap up, Part 2: How foreign elections are being hacked
In our last episode we reported on presentations at BlackHat USA 2020 about election interference. In this second part, we look specifically at the Russian and Chinese approaches to disinformation campaigns and how it is less technology hacking and more about strategic use of social media.The vulnerability of the internet of things
The Internet of Things (IoT) is growing faster than the original internet. Cisco Systems predicts that internet-connected devices will represent 75 percent of all the internet traffic in less than 10 years, and Gartner predicts that there will be five times more IoT devices in use than there are people on the planet. But more than 90 percent of all those devices are easily hackable and will remain so for the foreseeable future. There are some companies working hard to fix the problem but until manufacturers decide to start designing for security, it's going to be a long road, indeed.CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond
In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.
We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.
Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.
Drill Down into the EU Toolbox for 5G Security
CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond
In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.
We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.
Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.
Drill Down into the EU Toolbox for 5G Security
CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond
In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.
We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.
Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.
Drill Down into the EU Toolbox for 5G Security