Episodes

  • EP 80: The Dangers of White Label Devices
    Feb 3 2026

    Many devices on modern networks aren’t what their labels claim. This episode, Rob King, Director of Applied Security Research at runZero, explores white-labeled surveillance and IoT hardware, why some vendors are banned by governments, and how hidden risks can spread across enterprises. Discovery, device fingerprinting, and protocol analysis reveal what’s really connected—and why knowing your true inventory is now essential for security, compliance, and trust.

    Show More Show Less
    38 mins
  • EP 79: Ignore OT Security At Your Own Peril
    Jan 22 2026

    The growing importance of OT security, highlighting overlooked risks in critical infrastructure, legacy systems, and supply chains. Through real-world examples, Eric Durr, Chief Product Officer at Tenable, shows why OT security differs from IT, emphasizing visibility, resilience, and risk prioritization to protect safety, operations, and business continuity.

    Show More Show Less
    38 mins
  • EP 78: In Defense of Autonomous Vehicles
    Jan 7 2026

    At Black Hat USA 2025, Dan Berte, IoT Director at Bitdefender, discusses the successes and failures of ride-sharing autonomous vehicles in San Francisco, and how these lessons might help design better IoT integrations of cities and AVs in the future.

    Show More Show Less
    23 mins
  • EP 77: Building a Cyber Physical System Device Library
    Dec 9 2025

    Do you really know what’s on your network? A lot of OT devices are white labeled, meaning they have a brand name but under the hood they’re made by someone else. Sean Tufts, Field CTO for Claroty, explains how his team is using AI to sift through all the available data and build a cyber physical library that starts to add specificity to remediation operations, and improve cyber physical security overall

    Show More Show Less
    27 mins
  • EP 76: Why Security Certs for New Medical Devices Might Just Work
    Nov 26 2025

    Diversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.

    Show More Show Less
    37 mins
  • EP 75: IoT-based Living Off The Land Attacks and Air-Gapping Solar Systems
    Nov 11 2025

    At Black Hat USA 2025, Dan Berte, IoT Director at BitDefender, revisits his talk last year about hacking solar panels in light of the blackout in Spain and Portugal. While the Iberian Peninsula blackout wasn’t an attack, it shows how sensitive these systems are when mixing old and new technologies, and how living off the land attacks might someday take advantage of that.

    Show More Show Less
    24 mins
  • EP 74: Turning Surveillance Cameras on their Axis
    Oct 28 2025

    At Black Hat USA 2025, Noam Moshe from Claroty’s Team 82 revealed several vulnerabilities in Axis Communications’ IP camera systems, including a deserialization flaw that could let attackers run remote code. The team worked with Axis to patch the issues. Moshe says that this case highlights the broader security risks still common in the billions of common IoT devices in the world today.

    Show More Show Less
    29 mins
  • EP 73: BADBOX 2.0: Blurring the line between bots and human for cybercrime
    Oct 14 2025

    Ad fraud driven by both humans and AI agents require new signals beyond traditional bot-vs-human checks. Gavin Reid and Lindsay Kaye from HUMAN Security discuss how monetization includes ad and click fraud (peach pit), selling residential proxy access, and operating botnets for hire and preventing harm requires dismantling criminal infrastructure and collaboration across industry, since many infected devices cannot be practically cleansed by end users.

    Show More Show Less
    38 mins