The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
…
continue reading
Oilfield Strong Webinar Series is proudly sponsored by OTA Environmental Solutions & ESG-Dynamics OTA Environmental Solutions (www.otaenvironmentalsolutions.com) sells and services vapor recovery, wellhead compression, flares, combustors and other environmental solutions throughout the US. Our environmental services group (www.otaenvironmental.com) supports your full array of environmental needs including air permits, regulatory filings, Phase 1's, LDAR, SPPC plans, etc. Our sister company, ...
…
continue reading
The podcast where girls talk industrial automation! We interview people from all walks of life in the Industrial Automation industry. Through a personal narrative/conversational framework we talk about PLCs, SCADA, IIoT, Machine Vision, Industrial Robots, Pneumatics, Control Systems, Process Automation, Factory Automation, Systems Integration, Entrepreneurship, Career Stories, Personal Journeys, Company Culture, and any other interesting and timely topic we want to discuss. Co-Hosted by Nikk ...
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
Join CYBR.SEC.CON. cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
…
continue reading
The Control Amplified podcast offers in-depth interviews and discussions with industry experts about important topics in the process control and automation field, exploring underlying issues affecting users, system integrators, suppliers and others in these industries.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Diving (Pun Intended) into SCADA and Control Systems with Randy Petersen
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54In this episode, SJRA SCADA Superintendent and HOU.SEC.CON./OT.SEC.CON. speaker Randy Petersen joins Michal and Sam on the podcast to share his expertise on SCADA systems and the unique security challenges facing water facilities. They highlight real-world incidents and vulnerabilities in OT environments, offer practical advice for improving OT sec…
…
continue reading
1
שיחה עם המייסדים של קוונטימאיז פרופ' עמנואל דלה-טורה המדען ראשי ודניאל פורת מנכ"ל החברה על מחשוב קוונטי ויישומים
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05ושא המחשוב הקוונטי נמצא ברקע כבר מספר לא מועט של שנים, מי שזה לא עיסוקו שמע "שזה שונה" ומאפשר כוח עיבוד באופן אקספוננציאלי גדול יותר מול המחשוב העכשווי. שהנושא עולה בתחום הסייבר תמיד זה מוביל לאותה נקודה, ההצפנות הקיימות יפרצו בין רגע ולא יהוו מחסום לתוקפים, האומנם? נחשון פינקו מארח את מייסדי קוונטימאיז פרופ' עמנואל דלה טורה מאוניברסיטת בר אילן המד…
…
continue reading
1
Ep. 87 - ESA: "Everything Stops All" vs Protection of Species
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02Melinda Taylor brings over three decades of experience to the complex discussion around the Endangered Species Act (ESA), exploring its history, purpose, and the many misconceptions that surround it—especially within the oil and gas industry. In this episode, Grant Swartzwelder and Melinda unpack how the ESA operates, the challenges it poses, and o…
…
continue reading
1
CISO Lessons from a Children’s Novel as Cybersecurity Outgrows IT and Building Talent - Tom Arnold - BSW #429
1:03:10
1:03:10
Play later
Play later
Lists
Like
Liked
1:03:10Cyber threats and cyber criminals indiscriminately target the old as well as young regardless of race, creed or origin. Teens and young adults must realize that on the Internet nobody knows you’re a rat. How do we keep kids and young adults safe in an era of AI-driven attacks? Tom Arnold, Adjunct Professor, Digital Evidence & Forensics, Cybersecuri…
…
continue reading
1
Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy , Aaran Leyland, and More - SWN #544
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Pornhub Redux, Enki, Grok, BSODs, NORDVPN, Kimwolf, Privacy in Rhode Island, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-544
…
continue reading
1
The Upsides and Downsides of LLM-Generated Code - Chris Wysopal - ASW #364
1:10:12
1:10:12
Play later
Play later
Lists
Like
Liked
1:10:12Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
…
continue reading
1
Episode 422: 2026 Pipeline Predictions with Mark LaCour
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53In this episode of the Pipeliners Podcast, Russel Treat is joined by returning guest Mark LaCour for a wide-ranging discussion on what the pipeline industry may face in 2026. Together, they reflect on prior-year predictions before exploring forward-looking themes such as infrastructure investment, LNG expansion, workforce constraints, data and digi…
…
continue reading
1
Why are cybersecurity predictions so bad? - ESW #440
1:29:41
1:29:41
Play later
Play later
Lists
Like
Liked
1:29:41For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
…
continue reading
1
Defending the Boundaryless Cloud: Understanding Threats That Matter - Cameron Sipes, Steve Stone - SWN #543
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
…
continue reading
1
Breaking Into Cybersecurity - PSW #907
1:05:11
1:05:11
Play later
Play later
Lists
Like
Liked
1:05:11Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
…
continue reading
We’re wrapping up 2025 with a special episode! Michael and Sam are talking to Jessvin Thomas, CEO of Auguria and winner of CYBR.SEC.CON.’s first pitch competition for cybersecurity startups! They discuss the evolving challenges in cybersecurity, the importance of root cause analysis, and how AI and context are shaping the future of SOC operations. …
…
continue reading
1
Say Easy, Do Hard - Preventing Burnout, Focusing on CISO Health and Wellness - BSW #428
52:24
52:24
Play later
Play later
Lists
Like
Liked
52:24CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
…
continue reading
1
SentinelOne and AWS Shape the Future of AI Security with Purple AI - Rachel Park, Brian Mendenhall - SWN #542
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
…
continue reading
1
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363
1:06:43
1:06:43
Play later
Play later
Lists
Like
Liked
1:06:43In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
…
continue reading
1
Episode 421: Merry Christmas to the Pipeliners
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "56051384-6f0c-4bbf-ad1c-bf56567096e1" data-testid= "conversation-turn-2" data-scroll-anchor="true" data-turn= "assistant">…
…
continue reading
1
Holiday Chat: Local AI datacenter activism, AI can't substitute good taste, and more - ESW #439
1:13:43
1:13:43
Play later
Play later
Lists
Like
Liked
1:13:43For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the holiday break, so I decided to just roll with a general chat and see how it went. Also, apologies, for any audio quality issues, as the meal I promised to make for dinner this day required a lot of p…
…
continue reading
1
Holiday Special Part 2: You’re Gonna Click the Link - Rob Allen - SWN #541
34:25
34:25
Play later
Play later
Lists
Like
Liked
34:25You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
…
continue reading
1
Building a Hacking Lab in 2025 - PSW #906
1:03:21
1:03:21
Play later
Play later
Lists
Like
Liked
1:03:21The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
…
continue reading
1
The CISO Holiday Party 2025: Leadership Lessons from the Year That Was - BSW #427
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
…
continue reading
1
Holiday Special Part 1: You’re Gonna Click the Link - Rob Allen - SWN #540
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
…
continue reading
1
Collide AI 2025 Wrapped Part 1: Why Forward Deployed Engineers Ship When AI Pilots Fail
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05Collide AI 2025 Wrapped Part 1 turns into a real talk on why forward deployed engineers win where AI pilots stall, with Michael Cortez, John, and Nick Smart swapping war stories from completions, geophysics, and the startup trenches while they map out how Collide Enterprise moves past basic chat tools into search plus workflows that actually hold u…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Episode 420: Just the Facts, the Reality of the Energy Transition with Scott Tinker
38:15
38:15
Play later
Play later
Lists
Like
Liked
38:15*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:450147e8-03fe-4ef4-b7ab-68292b9e05ac-1" data-testid= "conversation-turn-4" data-scroll-anchor="true" data-turn= "assistant"> This episode of the Pipeliners Podcast features a thoughtful conversation with Scot…
…
continue reading
1
Internal threats are the hole in Cybersecurity’s donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Play later
Play later
Lists
Like
Liked
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
…
continue reading
1
Auld Lang Syne, Ghostpairing, Centerstack, WAFS, React2Shell, Crypto, Josh Marpet... - SWN #539
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Auld Lang Syne, Ghostpairing, Centerstack, OneView, WAFS, React2Shell Redux, Crypto, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-539
…
continue reading
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
…
continue reading
1
Ep. 86 - The Challenged Future of Environmental Advocacy
41:20
41:20
Play later
Play later
Lists
Like
Liked
41:20Environmental advocacy faces significant challenges in today’s political and social landscape, especially regarding climate change and energy policy. In this episode, Grant Swartzwelder talks with Colin Leyden, Texas State Director for the Environmental Defense Fund, who shares insights from over 30 years of experience navigating the complexities o…
…
continue reading
1
Cybersecurity Hiring Trends as Boards Bridge Confidence Gap and Build Strategic Lever - Jim McCoy - BSW #426
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
…
continue reading
1
Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's pix, Aaran Leyland. - SWN #538
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's Pix, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-538
…
continue reading
1
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
…
continue reading
1
Episode 419: Determining Fitness for Service with Keith Leewis
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:53f1f067-5698-4ab7-84a8-7f82cb2b4525-1" data-testid= "conversation-turn-4" data-scroll-anchor="true" data-turn= "assistant"> In this episode of the Pipeliners Podcast, Dr. Keith Leewis joins the show for a pr…
…
continue reading
1
What could you do with an 'always on' digital twin?
11:53
11:53
Play later
Play later
Lists
Like
Liked
11:53The concept of the digital twin is perhaps the centerpiece of digital transformation when it comes to the industrial enterprise. Think about it: What if the same digital model used to optimize the design of an industrial facility or other complex machine lived on in the form of a continuously current simulation that could optimize the real-time per…
…
continue reading
1
Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437
1:49:42
1:49:42
Play later
Play later
Lists
Like
Liked
1:49:42Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
…
continue reading
1
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet... - SWN #537
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet, and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-537
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Combining human and machine capabilities for optimal performance
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32The emergence of artificial intelligence in the industrial automation space is elevating the role of the control system from simply executing operator commands to providing expert guidance to human operators. At Honeywell, they call this Digital Cognition, and at the company's recent users group meeting in The Hague, Netherlands, Control's Keith La…
…
continue reading
1
Salesforce Security Risks, Boards Duty of Care, and Managing CISO Risks - Justin Hazard - BSW #425
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
…
continue reading
1
Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Aaran Leyland... - SWN #536
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50We've got: Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Ships at Sea, Sora, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-536
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
…
continue reading
1
Episode 418: Issues with Old vs. New Pipe with Keith Leewis
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51In this week's episode of the Pipeliners Podcast, Dr. Keith Leewis joins to discuss the differences between old and new steel pipe and why those distinctions matter for pipeline integrity and maintenance practices. The conversation highlights how manufacturing methods, coatings, and metallurgical properties influence how pipeline materials behave o…
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
EP 78: Bruce Holman & Corey Scott from Energy Payables
1:10:28
1:10:28
Play later
Play later
Lists
Like
Liked
1:10:28Bruce Holman and Corey Scott showed up ready to blow up the idea that accounts payable has to be slow, messy, and stuck in the past. They walked us through how Energy Payables is flipping the script with a platform that actually makes sense for operators and vendors, think cleaner workflows, real transparency, and smart tech like AI doing the heavy…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Ep. 85 - Being Stolen Blind? The Oilfield Fights Back!
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Texas is facing a growing crisis of oilfield theft, with losses reaching up to a billion dollars annually. In this episode, Chairman Jim Wright of the Texas Railroad Commission shares his insights on the sophisticated nature of this crime, the newly created task force under Senate Bill 494, and the collaborative efforts underway to combat theft and…
…
continue reading
1
Joining Cybersecurity Kicking and Screaming with Keith Turpin
44:41
44:41
Play later
Play later
Lists
Like
Liked
44:41In today's episode Michael and Sam are talking to Friedkin Group CISO and HOU.SEC.CON. speaker, Keith Turpen! They dive into the recent CloudFlare outage and what it means for cybersecurity professionals, explore Keith's fascinating career journey from mechanical engineering to becoming a CISO, and unpack valuable leadership lessons he shared at th…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-534
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
Episode 417: Fundamentals of Pipeline Metallurgy with Keith Leewis
48:14
48:14
Play later
Play later
Lists
Like
Liked
48:14This episode of the Pipeliners Podcast features a conversation with metallurgical expert Keith Leewis, who introduces the fundamentals of pipeline metallurgy and explains how steelmaking practices have evolved over time. The discussion explores the key concepts that influence how modern and legacy pipeline steels behave, setting the stage for a mul…
…
continue reading