Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
When a Patch Reopens the Safety Case
|
May 20, 2026 |
|
The Trap of the Trusted Engineering Session
|
May 19, 2026 |
|
When VEX Becomes a Bureaucratic Shield
|
May 15, 2026 |
|
Why FRMCS Cannot Trust the Mobile Carrier
|
May 13, 2026 |
|
The Token That Bypassed the Jump Host
|
May 11, 2026 |
|
Poisoning the Software Defined Vehicle at Birth
|
May 08, 2026 |
|
Why Rail Operators Fear the Patch
|
May 06, 2026 |
|
When Physics is the Final Firewall
|
May 04, 2026 |
|
That is the part many cybersecurity plans still miss, OT controls under revision
|
May 01, 2026 |
|
Supply Chain: When the supplier will not cooperate resilience must become
|
Apr 29, 2026 |
|
Zero Trust in OT does not start at the HMI
|
Apr 27, 2026 |
|
[2026] Critical: The NIS2 problem is no longer whether the | Incident Response
|
Apr 24, 2026 |
|
[2026] Deep Dive: Some of the hardest OT risks in rail | Zero Trust
|
Apr 22, 2026 |
|
[2026] Deep Dive: A bad weld passes inspection | OT Security
|
Apr 20, 2026 |
|
[2026] Critical: Zero Trust for Brownfield OT - IEC 62443
|
Apr 17, 2026 |
|
[2026] Critical: Vendor Lock-in - Ransomware
|
Apr 15, 2026 |
|
[2026] Critical: The Plausibility Gap - IEC 62443
|
Apr 13, 2026 |
|
IBM Data Breach Report 2026: The $1.9M Resilience Gap and NIS2 Compliance
|
Apr 10, 2026 |
|
The 56% Problem: Why Attackers No Longer Need Passwords (IBM X-Force Analysis)
|
Apr 08, 2026 |
|
When Your Security Scanner Becomes the Trojan Horse: The CERT-EU Supply Chain Breach
|
Apr 06, 2026 |
|
Why Evidence Does Not Equal Confidence
|
Apr 03, 2026 |
|
Legacy rail assets do not become secure by policy
|
Apr 01, 2026 |
|
If the secure reflash takes longer, the shortcut wins
|
Mar 30, 2026 |
|
Jeep, Gateways and the Myth of Clean Isolation
|
Mar 27, 2026 |
|
Rail Service Risk Starts Outside the SIL Boundary
|
Mar 25, 2026 |
|
Oldsmar Was About Standing Trust
|
Mar 23, 2026 |
|
Why Quantum Security Paralyzes Industrial Infrastructure
|
Mar 20, 2026 |
|
Cybersecurity Under Pressure: The Executive Brief
|
Mar 19, 2026 |
|
How Stolen Credentials Break Industrial Plants
|
Mar 18, 2026 |
|
Cybersecurity Under Pressure: The Executive Brief
|
Mar 17, 2026 |
|
Why Hidden Text Hacks Enterprise AI
|
Mar 16, 2026 |
|
DDoS and Hacktivism: When Disruption Becomes a Board-Level Threat
|
Mar 14, 2026 |
|
[2026] Urgent: When AI Agents Become the New Insider Threat - Zero Trust
|
Mar 11, 2026 |
|
[2026] Critical: Logged In, Not Hacked - Railway
|
Mar 09, 2026 |
|
KEV-First Patch Ops: Defending the Exposed Control Plane
|
Mar 06, 2026 |
|
The Illusion of MFA: AiTM Phishing and Session Token Theft
|
Mar 04, 2026 |
|
Automotive Extortion Goes Upstream: Protecting the New Vehicle Perimeter
|
Mar 02, 2026 |
|
Invisible Conduits: The Control Plane Siege
|
Feb 28, 2026 |
|
Hostile Time: When the Clock Lies in Critical OT
|
Feb 27, 2026 |
|
The 18:45 Reflash: When Usability Friction Becomes a Threat
|
Feb 25, 2026 |
|
The Friday Night Patch & The Illusion of Segmentation
|
Feb 23, 2026 |
|
Weekly Roundup: State Machine Breakdown & Engineering the Degraded Mode
|
Feb 21, 2026 |
|
Engineer the Path, Not Just the Perimeter
|
Feb 20, 2026 |
|
02:00 AM Panic: Does "Break-Glass" Mean "Break-Security"?
|
Feb 18, 2026 |
|
When Maintenance Becomes the Weapon: The Oldsmar Incident
|
Feb 16, 2026 |
|
[2026] Critical: When the Hypervisor Becomes the Attack Surface - Patching
|
Feb 07, 2026 |