エピソード

  • The Great Bifurcation: Why Average Security Is Disappearing (And Which Side You’re On)
    2026/04/10

    Global breach costs just fell for the first time in five years. So why did US costs hit record highs? The answer reveals a market splitting in two: organizations with disciplined governance that absorb attacks and recover, and those entering a spiral of escalating costs and regulatory scrutiny.

    This episode targets the C-suite and security leaders navigating NIS2 compliance. We analyze the $1.9 million resilience gap, the 80-day detection advantage, and why AI adoption without operational discipline is just expensive theater. As the middle tier of "average security" vanishes, we examine the hard questions boards must ask: Are you building organizational capacity to withstand shocks, or merely purchasing prevention tools while your operational fundamentals remain unchanged? The bifurcation is here. The only question is which curve you’re riding.

    続きを読む 一部表示
    37 分
  • The 56% Problem: Why Attackers No Longer Need Passwords (IBM X-Force Analysis)
    2026/04/08

    The 2026 IBM X-Force Threat Intelligence Index reveals a chilling statistic: more than half of last year’s exploited vulnerabilities required zero authentication to breach. The barrier to entry hasn’t disappeared—it has shifted from sophistication to pure velocity.

    In this episode we explore why "basic hygiene" is a dangerously vague concept and what "exposure management" actually means in practice. We break down the compression of the attack window from disclosure to exploitation, the rise of machine-to-machine identity as the new perimeter, and why your patching tempo measured in tickets is losing against adversaries measuring in API calls. Whether you’re managing cloud infrastructure or industrial control systems, this discussion reframes the boardroom conversation from "Are we protected?" to "Are we fast enough?

    続きを読む 一部表示
    35 分
  • When Your Security Scanner Becomes the Trojan Horse: The CERT-EU Supply Chain Breach
    2026/04/06

    What happens when the tool you download to find vulnerabilities becomes the vulnerability itself? This week we dissect the European Commission breach where attackers exfiltrated 91.7GB of sensitive data through Trivy, a trusted open-source security scanner.

    We walk through the anatomy of a supply chain poisoning: how threat actors compromised upstream distribution channels, why traditional "trust but verify" models failed, and the three concrete controls that would have contained the blast radius. From artifact provenance verification to ephemeral CI/CD credentials, this episode translates the incident into an actionable playbook for security architects. If you’re ingesting third-party tools without cryptographic verification, this is the wake-up call you need before your next sprint.

    続きを読む 一部表示
    43 分
  • Why Evidence Does Not Equal Confidence
    2026/04/03

    In this episode of Cybersecurity Under Pressure: Real Attacks, Real Problems, we dive deep into the fascinating and destructive world of real-life cyber threats that have reshaped our global digital landscape.

    Join us as we explore the infamous Stuxnet worm, a highly sophisticated malware that infiltrated air-gapped industrial control systems to sabotage physical infrastructure, proving that cyberattacks can have devastating real-world consequences.

    We also unpack the massive Mirai botnet, which hijacked everyday IoT devices—like cameras and routers—by exploiting weak default passwords to launch some of the largest DDoS attacks in internet history. Finally, we discuss AMNESIA:33, a critical set of vulnerabilities hidden within open-source TCP/IP stacks that silently exposed millions of connected devices and complex supply chains worldwide.

    Beyond the attacks, we analyze the real problems organizations face today. From the hidden risks of firmware modifications to the dangerous illusion of safety created by 'compliance-based' paperwork that fails to guarantee actual operational security.

    Tune in to discover why shifting to outcome-based security and building robust embedded defenses is no longer optional, but essential for survival in today's threat landscape

    続きを読む 一部表示
    24 分
  • Legacy rail assets do not become secure by policy
    2026/04/01

    In this episode, we dive into the alarming reality of cyber threats in the modern railway sector.

    We explore major real-world incidents that prove critical infrastructure is a prime target, from a teenager derailing trams in Łódź, Poland using a reverse-engineered TV remote , to the notorious WannaCry ransomware outbreak that disrupted Deutsche Bahn's passenger information displays .

    We also unpack how attackers halted multiple trains across Poland by spoofing unencrypted "radio stop" signals , the severe supply chain breach that paralyzed Denmark's DSB network , and the psychological impact of hackers infiltrating Iranian rail systems to post fake delay notices .

    Join us as we break down these vulnerabilities and discuss why shifting from isolated legacy technology to robust, "Zero Trust" architectures and encrypted communications is absolutely essential for passenger safety

    続きを読む 一部表示
    28 分
  • If the secure reflash takes longer, the shortcut wins
    2026/03/30

    In this episode of "Cybersecurity Under Pressure: Real Attacks, Real Problems", we dive into the messy reality where theoretical cybersecurity collides with operational pressure.

    What happens when a dealership technician needs to rush a DoIP reflash at 6:45 PM on a Friday with a growing queue of vehicles on the bay?

    We discuss how the clash between security, which demands traceability and controlled releases, and service, which is measured by throughput and turnaround times, often turns dangerous shortcuts like shared credentials and cached approvals into the unofficial workflow.

    We also break down the most pressing real-world cyber threats facing the automotive ecosystem today. We analyze how attackers are using devices disguised as Bluetooth speakers to perform CAN injection attacks through a car's headlights, stealing vehicles in under two minutes.

    Furthermore, we explore why auto dealerships are prime targets for cybercriminals, with social engineering and ransomware accounting for a massive portion of attacks that threaten to encrypt or leak sensitive customer data.

    Finally, we examine the daunting technical and organizational challenges brought by the new UN R155 and R156 regulations and ask the ultimate question: can these mandated secure paths actually survive the intense pressure of the workshop floor?

    Tune in as we dissect the vulnerabilities hidden not just in the code, but within human incentive models.

    続きを読む 一部表示
    24 分
  • Jeep, Gateways and the Myth of Clean Isolation
    2026/03/27

    In this episode, we dive into why the infamous Jeep hack is not just nostalgia, but a live architectural problem that the automotive sector still wrestles with today.

    While connected features demand reach and product teams crave convenience, we explore how modern vehicle architectures struggle to neatly isolate trust boundaries in the real world.In theory, gateways, domain controllers, and embedded firewalls should separate critical functions.

    In practice, however, diagnostics, telematics, backend services, and over-the-air update paths keep creating privileged bridges across those very boundaries.

    The core challenge isn't simply about better CAN bus segmentation; it’s about whether a vehicle platform, already frozen across suppliers, validation cycles, and cost targets, can remain cleanly isolated as remote services and lifecycle updates continue to expand.

    The real risk is a security boundary that only exists on paper and gets looser with every program year.

    Join us as we unpack why the trust problem never truly left, but simply moved, and how emerging frameworks like UN R155, UN R156, and ISO/SAE 21434 are attempting to address these critical vulnerabilities

    続きを読む 一部表示
    36 分
  • Rail Service Risk Starts Outside the SIL Boundary
    2026/03/25

    In this episode of Cybersecurity Under Pressure: Real Attacks, Real Problems, we explore the rapidly evolving threat landscape facing modern railway networks.

    The era of 'security by isolation' is officially over, as digital twins, AI, and interconnected operational technologies turn railways into massive, distributed attack surfaces.

    We break down real-world cyber incidents, including the 2023 Poland 'radio stop' attacks, the 2024 UK station Wi-Fi defacement, recent opportunistic incidents in Romania, and the severe service disruptions faced by Deutsche Bahn.

    We also discuss the very real, day-to-day problems facing operators today: from vulnerable legacy infrastructure and unencrypted radio frequencies, to the rising threat of supply chain sabotage and autonomous 'agentic AI' attacks.

    Join us as we analyze why hiding behind 'Non-SIL' (Safety Integrity Level) labels is a dangerous illusion that can collapse services and public trust, and how adopting technical specifications like TS 50701 and complying with the EU's NIS2 and CER directives can help transform reactive compliance into proactive cyber and physical resilience.

    続きを読む 一部表示
    35 分