Cybersecurity Magazine Podcast September 2021: LoRaWAN Security

In the latest editorial podcast from Cybersecurity Magazine, Hans Christian Rudolph and Philippa Jefferies discuss LoRaWAN security with Alper Yegin, Actility, LoRa Alliance.

Cybersecurity Magazine Podcast August 2021: Security Awareness

In the latest editorial podcast from Cybersecurity Magazine, we discuss the importance of security awareness with Jonathan Hiroshi Rossi, Saya University.


Cybersecurity Magazine Podcast July 2021: Managing IT and OT System Security 

In the latest podcast, we welcome our new editorial board member Tom Madsen and talk to him about his work in security and how IT and OT systems are becoming more integrated

Cybersecurity Magazine Podcast June 2021: Cybersecurity for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

Cybersecurity Magazine Podcast May 2021: Security and Production Systems

In the latest Podcast, we talk to Edgar Weippl, SBA Research, about the security and production system engineering, as well as the upcoming ARES conference (August 17-20, 2021).

Cybersecurity Magazine Podcast April 2021: Smart Grid Security

In the latest Podcast, we talk to Rasmus Løvenstein Olsen, Aalborg University, about the security challenges of smart grids.

Cybersecurity Magazine Editorial Podcast: Open RAN for 5G and it’s role in security

In this editorial podcast, we discuss the concept of Open RAN, what it is and what it means for the security of 5G networks.

Cybersecurity Magazine Editorial Podcast: Overview of 5G Security

In this editorial discussion we give an overview of 5G security and discuss what it means for the future for 5G networks.

Other Podcasts

CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.

Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.

Drill Down into the EU Toolbox for 5G Security


CSM Podcast: Smart Grid Security

In the latest Cybersecurity Magazine Podcast, we talk to Rasmus Løvenstein Olsen, Aalborg University, about his work in security and smart grid. His research at Aalborg University, Denmark, lies in communication and ICT in smart grid and smart grid services, with focus on faults and cyber attack, both detection and mitigation techniques on making grid supply more reliable. In this podcast we discuss the drivers behind smart grid technology, the security and privacy challenges, and how we can do better.

California small business grant program is a security nightmare

If you are a small business hoping for a grant from California to stay alive during the COVID-19 lockdown, you need to listen to this podcast. The state has chosen to work with third-party financial institutions to transfer the funds to banks, but those organizations are asking applicants to violate basic good practices for maintaining security. Moreover, some business banks have internal security mechanisms that prevent the connections being made between the state and the banks. You can do this safely, but you need to take precautions. We give your those precautions in this podcast.

Stupid Stuff in Tech

Technology has a lot of wondrous things going on but it has it’s fair share of stupid things as well. We took a moment to look at four of the more stupid things in tech of the past two weeks in the new year.

Airgap Networks: an absolute defense?

We talk to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks but don't stop them from happening. Network solutions are too expensive and do little to protect against people doing stupid things behind the firewall. It has really seemed hopeless for a while and very frustrating. Then we ran across It's affordable, scalable, and it stops ransomware from spreading throughout all connected devices in the network.

Phisihing threatens US elections

Between January and August 2020, The number of phishing sites detected by Google rose by more than 200,000 to 1,892,980.
“When you get that all too familiar barrage of spam emails, social engineers are betting that if you’re a MAGA supporter who received spoofed emails pitching progressive candidates or causes, you’ll click unsubscribe ,” says Adam Levin, founder of Cyberscout. Levin explained that the emails are rigged to download malware, ransomware, or access your accounts when you click unsubscribe." The dramatic increase is giving rise to an entire sub-industry dedicated to zero-trust technologies that are slowly coming to market. Maybe too slowly for the 2020 election cycle. We talked to two of them: Zero Fox and Airgap Networks

BlackHat wrap up, Part 1: How hostile states are hacking elections

Our first re-run of the season is going back to our report on election hacking, a two-parter, that doesn't dwell on the technology of elections as much as how they can be influenced. For several years we have heard about how technologically vulnerable our elections systems are, but it turns out that physically hacking a system is a lot harder and yields insignificant fruit in national elections. It is much easier to sway voters with disinformation.

CSM Podcast: Security and Production System Engineering with Edgar Weippl

We talk to Edgar Weippl, SBA Research, University of Vienna, about his work in security and production systems.

We discuss why cyber security is a particular challenge for production system engineering, the impact that increased wireless connectivity in production systems can have, and how the industry can move forward in this area.

We also chat about the upcoming ARES conference (International Conference on Availability, Reliability and Security) which will be held virtually from August 17-20, 2021.


Human Error can still Defeat Cybersecurity tech

As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth is, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.

Sometimes, a digital breach just isn't your fault

Even the most security-conscious people and organizations get hacked, so it's not always something you can stop. We go back to talk with #Sectigo's VP of IoT security, Alan Grau to talk about how a security training from got hacked through a common phishing scam, how deep the flaws in our technology are and finally, how Sectigo is helping companies make secure technology.

Quantum computing is a security nightmare, but making it safe is a priority for Sectigo

Some people think quantum computers are mostly hype. They are. We won't see them come into real use for a decade. In the meantime, people are freaking out over how they can be used to makes us all less safe. The good news is some companies, like Sectigo, are working on ways to make sure we are all safe when they actually become a reality. So grab a coffee and listen to our take on quantum computer security.

BlackHat wrap up, Part 2: How foreign elections are being hacked

In our last episode we reported on presentations at BlackHat USA 2020 about election interference. In this second part, we look specifically at the Russian and Chinese approaches to disinformation campaigns and how it is less technology hacking and more about strategic use of social media.

The vulnerability of the internet of things

The Internet of Things (IoT) is growing faster than the original internet. Cisco Systems predicts that internet-connected devices will represent 75 percent of all the internet traffic in less than 10 years, and Gartner predicts that there will be five times more IoT devices in use than there are people on the planet. But more than 90 percent of all those devices are easily hackable and will remain so for the foreseeable future. There are some companies working hard to fix the problem but until manufacturers decide to start designing for security, it's going to be a long road, indeed.