Videos

Cybersecurity Magazine Podcast December 2021: ETSI Test Specification for Secure IoT Consumer Devices 

James Deacon, DCMS, talks to Hans Christian Rudolph and Philippa Jefferies about the new ETSI test specification for the ETSI EN 303 645, the world leading consumer IoT security standard.

Cybersecurity Magazine Podcast November 2021: Blockchain and Security

In the latest Cybersecurity Magazine Podcast, Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity. 

Cybersecurity Magazine Podcast October 2021: Open-Source Software

In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Sandeep Shukla, C3i Center, IIT Kanpur, about open-source software and its use for cybersecurity.

 

Cybersecurity Magazine Podcast September 2021: LoRaWAN Security

In the latest editorial podcast from Cybersecurity Magazine, Hans Christian Rudolph and Philippa Jefferies discuss LoRaWAN security with Alper Yegin, Actility, LoRa Alliance.

Cybersecurity Magazine Podcast August 2021: Security Awareness

In the latest editorial podcast from Cybersecurity Magazine, we discuss the importance of security awareness with Jonathan Hiroshi Rossi, Saya University.

 

Cybersecurity Magazine Podcast July 2021: Managing IT and OT System Security 

In the latest podcast, we welcome our new editorial board member Tom Madsen and talk to him about his work in security and how IT and OT systems are becoming more integrated

Cybersecurity Magazine Podcast June 2021: Cybersecurity for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

Cybersecurity Magazine Podcast May 2021: Security and Production Systems

In the latest Podcast, we talk to Edgar Weippl, SBA Research, about the security and production system engineering, as well as the upcoming ARES conference (August 17-20, 2021).

Cybersecurity Magazine Podcast April 2021: Smart Grid Security

In the latest Podcast, we talk to Rasmus Løvenstein Olsen, Aalborg University, about the security challenges of smart grids.

Cybersecurity Magazine Editorial Podcast: Open RAN for 5G and it’s role in security

In this editorial podcast, we discuss the concept of Open RAN, what it is and what it means for the security of 5G networks.

Cybersecurity Magazine Editorial Podcast: Overview of 5G Security

In this editorial discussion we give an overview of 5G security and discuss what it means for the future for 5G networks.

Other Podcasts

CSM Podcast – ETSI Test Specification for Secure IoT Consumer Devices with James Deacon

In the last Cybersecurity Magazine podcast of the year, James Deacon, DCMS, talks to Hans Christian Rudolph and Philippa Jefferies about the new ETSI test specification for the ETSI EN 303 645, the world leading consumer IoT security standard. They discuss what the standard is, who it affects, and the importance of standards for consumer security.    

CSM Podcast – Blockchain and Security with Ahmed Banafa

Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity. They discuss what blockchain is, its many applications, and how it can be used to guarantee greater security.Ahmed Banafa is the author of the book ‘Blockchain Technology and Applications’ which explores the fundamentals and applications of Blockchain technology, as well as its relationship with Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation.

CSM Podcast – Open-Source Software for Cybersecurity with Sandeep Shukla

In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Sandeep Shukla, C3i Center, IIT Kanpur, about open-source software and its use for cybersecurity. They discuss the importance of open-source software, its benefits and limitations, as well as the best way to find open-source security tools.

CSM Podcast – LoRaWAN Security with Alper Yegin

In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Alper Yegin, Actility, LoRa Alliance, about LoRaWAN.

They discuss what LoRaWAN is, the role it plays in the IoT and various use cases, as well as the security built into the network.

 

CSM Podcast: Managing IT and OT System Security

In the latest Cybersecurity Magazine Podcast, we welcome our new editorial board member Tom Madsen and talk to him about his work in security and how IT and OT systems are “growing together”. We discuss the distinction between OT and IT systems, how they are becoming more integrated together, and the security challenges this can bring.

CSM Podcast: Smart Grid Security

In the latest Cybersecurity Magazine Podcast, we talk to Rasmus Løvenstein Olsen, Aalborg University, about his work in security and smart grid. His research at Aalborg University, Denmark, lies in communication and ICT in smart grid and smart grid services, with focus on faults and cyber attack, both detection and mitigation techniques on making grid supply more reliable. In this podcast we discuss the drivers behind smart grid technology, the security and privacy challenges, and how we can do better.

Stupid Stuff in Tech

Technology has a lot of wondrous things going on but it has it’s fair share of stupid things as well. We took a moment to look at four of the more stupid things in tech of the past two weeks in the new year.

Airgap Networks: an absolute defense?

We talk to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks but don't stop them from happening. Network solutions are too expensive and do little to protect against people doing stupid things behind the firewall. It has really seemed hopeless for a while and very frustrating. Then we ran across Airgap.io It's affordable, scalable, and it stops ransomware from spreading throughout all connected devices in the network.

Phisihing threatens US elections

Between January and August 2020, The number of phishing sites detected by Google rose by more than 200,000 to 1,892,980.
“When you get that all too familiar barrage of spam emails, social engineers are betting that if you’re a MAGA supporter who received spoofed emails pitching progressive candidates or causes, you’ll click unsubscribe ,” says Adam Levin, founder of Cyberscout. Levin explained that the emails are rigged to download malware, ransomware, or access your accounts when you click unsubscribe." The dramatic increase is giving rise to an entire sub-industry dedicated to zero-trust technologies that are slowly coming to market. Maybe too slowly for the 2020 election cycle. We talked to two of them: Zero Fox and Airgap Networks

BlackHat wrap up, Part 1: How hostile states are hacking elections

Our first re-run of the season is going back to our report on election hacking, a two-parter, that doesn't dwell on the technology of elections as much as how they can be influenced. For several years we have heard about how technologically vulnerable our elections systems are, but it turns out that physically hacking a system is a lot harder and yields insignificant fruit in national elections. It is much easier to sway voters with disinformation.

CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.

Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.

Drill Down into the EU Toolbox for 5G Security

 

CSM Podcast – LoRaWAN Security with Alper Yegin

In the latest Cybersecurity Magazine Podcast, Philippa Jefferies and Hans Christian Rudolph talk to Alper Yegin, Actility, LoRa Alliance, about LoRaWAN.

They discuss what LoRaWAN is, the role it plays in the IoT and various use cases, as well as the security built into the network.

 

CSM Podcast: Security Awareness with Jonathan Hiroshi Rossi

In the latest editorial podcast from Cybersecurity Magazine, we discuss the importance of security awareness with Jonathan Hiroshi Rossi, Saya University.

We talk about what security awareness means, variations in its approach for different countries and cultures, and what can be done to help improve it for better overall security.

 

CSM Podcast – Blockchain and Security with Ahmed Banafa

Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity. They discuss what blockchain is, its many applications, and how it can be used to guarantee greater security.Ahmed Banafa is the author of the book ‘Blockchain Technology and Applications’ which explores the fundamentals and applications of Blockchain technology, as well as its relationship with Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation.

CSM Podcast: Security Awareness with Jonathan Hiroshi Rossi

In the latest editorial podcast from Cybersecurity Magazine, we discuss the importance of security awareness with Jonathan Hiroshi Rossi, Saya University.

We talk about what security awareness means, variations in its approach for different countries and cultures, and what can be done to help improve it for better overall security.

 

CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.

Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.

Drill Down into the EU Toolbox for 5G Security

 

CSM Podcast: Security and Production System Engineering with Edgar Weippl

We talk to Edgar Weippl, SBA Research, University of Vienna, about his work in security and production systems.

We discuss why cyber security is a particular challenge for production system engineering, the impact that increased wireless connectivity in production systems can have, and how the industry can move forward in this area.

We also chat about the upcoming ARES conference (International Conference on Availability, Reliability and Security) which will be held virtually from August 17-20, 2021.

 

Human Error can still Defeat Cybersecurity tech

As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth is, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.

Sometimes, a digital breach just isn't your fault

Even the most security-conscious people and organizations get hacked, so it's not always something you can stop. We go back to talk with #Sectigo's VP of IoT security, Alan Grau to talk about how a security training from got hacked through a common phishing scam, how deep the flaws in our technology are and finally, how Sectigo is helping companies make secure technology.

Quantum computing is a security nightmare, but making it safe is a priority for Sectigo

Some people think quantum computers are mostly hype. They are. We won't see them come into real use for a decade. In the meantime, people are freaking out over how they can be used to makes us all less safe. The good news is some companies, like Sectigo, are working on ways to make sure we are all safe when they actually become a reality. So grab a coffee and listen to our take on quantum computer security.

BlackHat wrap up, Part 2: How foreign elections are being hacked

In our last episode we reported on presentations at BlackHat USA 2020 about election interference. In this second part, we look specifically at the Russian and Chinese approaches to disinformation campaigns and how it is less technology hacking and more about strategic use of social media.

The vulnerability of the internet of things

The Internet of Things (IoT) is growing faster than the original internet. Cisco Systems predicts that internet-connected devices will represent 75 percent of all the internet traffic in less than 10 years, and Gartner predicts that there will be five times more IoT devices in use than there are people on the planet. But more than 90 percent of all those devices are easily hackable and will remain so for the foreseeable future. There are some companies working hard to fix the problem but until manufacturers decide to start designing for security, it's going to be a long road, indeed.

CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.

Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.

Drill Down into the EU Toolbox for 5G Security

 

CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.

Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.

Drill Down into the EU Toolbox for 5G Security

 

CSM Editorial Podcast – Cybersecurity Policy for 5G and Beyond

In the latest editorial podcast from Cybersecurity Magazine, the editors discuss security policy for 5G technologies and beyond.

We talk about the importance of industry standards, the EU toolbox for 5G security, global discussions for common solutions and global standards, and look to the future of wireless technologies.

Anand Prasad, Hans Christian Rudolph, Rajeev Prasad, Philippa Jefferies.

Drill Down into the EU Toolbox for 5G Security

 

CSM Podcast – Blockchain and Security with Ahmed Banafa

Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity. They discuss what blockchain is, its many applications, and how it can be used to guarantee greater security.Ahmed Banafa is the author of the book ‘Blockchain Technology and Applications’ which explores the fundamentals and applications of Blockchain technology, as well as its relationship with Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation.

CSM Podcast – Blockchain and Security with Ahmed Banafa

Hans Christian Rudolph talks to Ahmed Banafa about Blockchain and its use for cybersecurity. They discuss what blockchain is, its many applications, and how it can be used to guarantee greater security.Ahmed Banafa is the author of the book ‘Blockchain Technology and Applications’ which explores the fundamentals and applications of Blockchain technology, as well as its relationship with Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation.