show episodes
 
Artwork
 
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork
 
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
  continue reading
 
Artwork

4
Oilfield Strong

OTA Environmental Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Oilfield Strong Webinar Series is proudly sponsored by OTA Environmental Solutions & ESG-Dynamics OTA Environmental Solutions (www.otaenvironmentalsolutions.com) sells and services vapor recovery, wellhead compression, flares, combustors and other environmental solutions throughout the US. Our environmental services group (www.otaenvironmental.com) supports your full array of environmental needs including air permits, regulatory filings, Phase 1's, LDAR, SPPC plans, etc. Our sister company, ...
  continue reading
 
Artwork

1
Automation Ladies

Automation Ladies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The podcast where girls talk industrial automation! We interview people from all walks of life in the Industrial Automation industry. Through a personal narrative/conversational framework we talk about PLCs, SCADA, IIoT, Machine Vision, Industrial Robots, Pneumatics, Control Systems, Process Automation, Factory Automation, Systems Integration, Entrepreneurship, Career Stories, Personal Journeys, Company Culture, and any other interesting and timely topic we want to discuss. Co-Hosted by Nikk ...
  continue reading
 
Artwork

1
Unsolicited Response

Dale Peterson: ICS Security Catalyst and S4 Conference Chair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
  continue reading
 
Artwork

4
Control Amplified

ControlGlobal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Control Amplified podcast offers in-depth interviews and discussions with industry experts about important topics in the process control and automation field, exploring underlying issues affecting users, system integrators, suppliers and others in these industries.
  continue reading
 
Artwork

4
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
In this episode, SJRA SCADA Superintendent and HOU.SEC.CON./OT.SEC.CON. speaker Randy Petersen joins Michal and Sam on the podcast to share his expertise on SCADA systems and the unique security challenges facing water facilities. They highlight real-world incidents and vulnerabilities in OT environments, offer practical advice for improving OT sec…
  continue reading
 
ושא המחשוב הקוונטי נמצא ברקע כבר מספר לא מועט של שנים, מי שזה לא עיסוקו שמע "שזה שונה" ומאפשר כוח עיבוד באופן אקספוננציאלי גדול יותר מול המחשוב העכשווי. שהנושא עולה בתחום הסייבר תמיד זה מוביל לאותה נקודה, ההצפנות הקיימות יפרצו בין רגע ולא יהוו מחסום לתוקפים, האומנם? נחשון פינקו מארח את מייסדי קוונטימאיז פרופ' עמנואל דלה טורה מאוניברסיטת בר אילן המד…
  continue reading
 
Melinda Taylor brings over three decades of experience to the complex discussion around the Endangered Species Act (ESA), exploring its history, purpose, and the many misconceptions that surround it—especially within the oil and gas industry. In this episode, Grant Swartzwelder and Melinda unpack how the ESA operates, the challenges it poses, and o…
  continue reading
 
Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
In this episode of the Pipeliners Podcast, Russel Treat is joined by returning guest Mark LaCour for a wide-ranging discussion on what the pipeline industry may face in 2026. Together, they reflect on prior-year predictions before exploring forward-looking themes such as infrastructure investment, LNG expansion, workforce constraints, data and digi…
  continue reading
 
For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
  continue reading
 
Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
  continue reading
 
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
  continue reading
 
We’re wrapping up 2025 with a special episode! Michael and Sam are talking to Jessvin Thomas, CEO of Auguria and winner of CYBR.SEC.CON.’s first pitch competition for cybersecurity startups! They discuss the evolving challenges in cybersecurity, the importance of root cause analysis, and how AI and context are shaping the future of SOC operations. …
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
  continue reading
 
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
  continue reading
 
*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "56051384-6f0c-4bbf-ad1c-bf56567096e1" data-testid= "conversation-turn-2" data-scroll-anchor="true" data-turn= "assistant">…
  continue reading
 
For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the holiday break, so I decided to just roll with a general chat and see how it went. Also, apologies, for any audio quality issues, as the meal I promised to make for dinner this day required a lot of p…
  continue reading
 
You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Collide AI 2025 Wrapped Part 1 turns into a real talk on why forward deployed engineers win where AI pilots stall, with Michael Cortez, John, and Nick Smart swapping war stories from completions, geophysics, and the startup trenches while they map out how Collide Enterprise moves past basic chat tools into search plus workflows that actually hold u…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:450147e8-03fe-4ef4-b7ab-68292b9e05ac-1" data-testid= "conversation-turn-4" data-scroll-anchor="true" data-turn= "assistant"> This episode of the Pipeliners Podcast features a thoughtful conversation with Scot…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
  continue reading
 
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
  continue reading
 
Environmental advocacy faces significant challenges in today’s political and social landscape, especially regarding climate change and energy policy. In this episode, Grant Swartzwelder talks with Colin Leyden, Texas State Director for the Environmental Defense Fund, who shares insights from over 30 years of experience navigating the complexities o…
  continue reading
 
Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:53f1f067-5698-4ab7-84a8-7f82cb2b4525-1" data-testid= "conversation-turn-4" data-scroll-anchor="true" data-turn= "assistant"> In this episode of the Pipeliners Podcast, Dr. Keith Leewis joins the show for a pr…
  continue reading
 
The concept of the digital twin is perhaps the centerpiece of digital transformation when it comes to the industrial enterprise. Think about it: What if the same digital model used to optimize the design of an industrial facility or other complex machine lived on in the form of a continuously current simulation that could optimize the real-time per…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
The emergence of artificial intelligence in the industrial automation space is elevating the role of the control system from simply executing operator commands to providing expert guidance to human operators. At Honeywell, they call this Digital Cognition, and at the company's recent users group meeting in The Hague, Netherlands, Control's Keith La…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
In this week's episode of the Pipeliners Podcast, Dr. Keith Leewis joins to discuss the differences between old and new steel pipe and why those distinctions matter for pipeline integrity and maintenance practices. The conversation highlights how manufacturing methods, coatings, and metallurgical properties influence how pipeline materials behave o…
  continue reading
 
Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
  continue reading
 
Bruce Holman and Corey Scott showed up ready to blow up the idea that accounts payable has to be slow, messy, and stuck in the past. They walked us through how Energy Payables is flipping the script with a platform that actually makes sense for operators and vendors, think cleaner workflows, real transparency, and smart tech like AI doing the heavy…
  continue reading
 
This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
  continue reading
 
Texas is facing a growing crisis of oilfield theft, with losses reaching up to a billion dollars annually. In this episode, Chairman Jim Wright of the Texas Railroad Commission shares his insights on the sophisticated nature of this crime, the newly created task force under Senate Bill 494, and the collaborative efforts underway to combat theft and…
  continue reading
 
In today's episode Michael and Sam are talking to Friedkin Group CISO and HOU.SEC.CON. speaker, Keith Turpen! They dive into the recent CloudFlare outage and what it means for cybersecurity professionals, explore Keith's fascinating career journey from mechanical engineering to becoming a CISO, and unpack valuable leadership lessons he shared at th…
  continue reading
 
While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
  continue reading
 
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
  continue reading
 
This episode of the Pipeliners Podcast features a conversation with metallurgical expert Keith Leewis, who introduces the fundamentals of pipeline metallurgy and explains how steelmaking practices have evolved over time. The discussion explores the key concepts that influence how modern and legacy pipeline steels behave, setting the stage for a mul…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play