podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Claroty
Shows
OT Security Hub
OT Asset Discovery met Claroty - Erwin Schürmann
#15: Diep Inzicht in OT Asset Discovery met ClarotyIn deze aflevering van de OT Security Hub Podcast duiken Joep van Heumen en Christiaan Glaser samen met Erwin Schürmann (Solution Engineer bij Claroty) in de wereld van asset discovery binnen operational technology (OT).Wat gebeurt er wanneer organisaties zelf geen idee hebben welke apparaten en systemen ze in hun OT-netwerk hebben draaien? Claroty biedt daar een oplossing voor met geavanceerde methodes voor asset inventory, passieve én actieve detectie, en netwerkvisualisatie – zónder de productie te verstoren.🎧 Wat je leert in deze afl...
2025-07-08
29 min
Nexus: A Claroty Podcast
Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents
Munish Walther-Puri of the Center for Global Affairs at New York University joins the Claroty Nexus podcast to discuss a homegrown severity scale for critical infrastructure cybersecurity incidents. The Infrastructure Cyber Incident Scale, or INCI Scale, brings a Richter-Scale-like criticality index to incidents based on the intensity, magnitude, and duration of an event. Walther-Puri unveiled the scale at the S4 Conference in Tampa.
2025-02-17
33 min
Nexus: A Claroty Podcast
CISA's Matthew Rogers on Secure by Demand for OT
Matthew Rogers, ICS Cybersecurity Strategy & R&D Lead at the Cybersecurity & Infrastructure Security Agency (CISA) joins the Nexus Podcast to discuss the agency's latest publication: “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products.” This guide features 12 cybersecurity recommendations that OT owners and operators should be looking for during procurement cycles with automation and control system vendors. Read Claroty's blog on the guide.Listen to every episode of the Nexus Podcast here.
2025-01-19
39 min
@BEERISAC: OT/ICS Security Podcast Playlist
Sharon Brizinov Director of Research @Claroty (Team82) finding OT variabilities before the attacker
Podcast: ICS Cyber Talks PodcastEpisode: Sharon Brizinov Director of Research @Claroty (Team82) finding OT variabilities before the attackerPub date: 2024-12-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationקבוצה82 היא אחת מקבוצות מחקר הסייבר המוערכות בעולם, המחקרים שלהם משפיעים על יצרנים ועולם הסייבר למערכות תפעוליות בכלל ולא רק. נחשון פינקו מארח את שרון בריזינוב דירקטור מחקר בחברת קלארוטי וראש קבוצת82 בשיחה על סייבר בעולמות התפעולים, איומים, תוקפים וכול מה שביניהם. מה ההבדל בין מחקר סייבר בעולמות הדאטה וסביבות תפעוליות כיצד מגיבים יצרנים למחקרים ועוד הבלוג של קבוצת82 : http://claroty.com/team82 Team82 is one of the most prestigious research teams. Its research has dramatically influenced OT vendors and the OT cyber industry. Nachshon Pincu hosts Sharon Brizinov, Director of Research at Claroty and head of Team82, to discuss operational technology (OT) cybersecurity research, threats, attacks, and related topics. The conversation explores key questions such as: What distinguishes IT from OT cybersecurity research? How do vendors respond to researchers' findings? And more. Team82 blog: http://claroty.com/team82
2024-12-29
49 min
ICS Cyber Talks Podcast
Sharon Brizinov Director of Research @Claroty (Team82) finding OT variabilities before the attacker
קבוצה82 היא אחת מקבוצות מחקר הסייבר המוערכות בעולם, המחקרים שלהם משפיעים על יצרנים ועולם הסייבר למערכות תפעוליות בכלל ולא רק. נחשון פינקו מארח את שרון בריזינוב דירקטור מחקר בחברת קלארוטי וראש קבוצת82 בשיחה על סייבר בעולמות התפעולים, איומים, תוקפים וכול מה שביניהם. מה ההבדל בין מחקר סייבר בעולמות הדאטה וסביבות תפעוליות כיצד מגיבים יצרנים למחקרים ועוד הבלוג של קבוצת82 : http://claroty.com/team82 Team82 is one of the most prestigious research teams. Its research has dramatically influenced OT vendors and the OT cyber industry. Nachshon Pincu hosts Sharon Brizinov, Director of Research at Claroty and head of Team82, to discuss operational technology (OT) cybersecurity research, threats, attacks, and related topics. The conversation explores key questions such as: What distinguishes IT from OT cybersecurity research? How do vendors respond to researchers' findings? And more. Team82 blog: http://claroty.com/team82
2024-12-25
49 min
Nexus: A Claroty Podcast
Noam Moshe on the IOCONTROL Malware
Claroty Team82 researcher Noam Moshe joins the Nexus Podcast to discuss the IOCONTROL malware used by an Iranian APT actor known as the CyberAv3ngers to target civilian critical infrastructure in the U.S. and Israel. The malware acts as a Linux-based backdoor and has a modular configuration that can be adapted for IoT, OT, and SCADA devices. Read Team82's research blog: "Inside a New OT/IoT Cyberweapon: IONCONTROL"Listen and subscribe to the Nexus Podcast here.
2024-12-19
23 min
Nexus: A Claroty Podcast
Team82 on Attacking the Insecure IoT Cloud
Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.You can find the research here on Team82's website. Listen and subscribe to the Nexus Podcast...
2024-12-13
31 min
Nexus: A Claroty Podcast
Volexity's Steven Adair on the Nearest Neighbor Attack
Volexity founder Steven Adair joins the Claroty Nexus Podcast to discuss the Nearest Neighbor Attack, a unique attack carried out by Russia's APT 28 against a high-value target in an attempt to gain intelligence on Ukraine prior to the start of the war in February 2022. APT 28 was able to compromise the Wi-Fi network of its target without being in physical proximity of it. They did so by remotely compromising neighboring organizations, accessing their Wi-Fi networks—creating a daisy-chain of breaches and compromises—until they were able to reach their target. Volexity's blog contains additional technical details. ...
2024-12-09
37 min