Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts112/v4/2b/0e/22/2b0e22e9-7ac2-2e51-3087-d1338b3f3924/mza_2743328970772515032.jpg/600x600bb.jpg
Error Code
Robert Vamosi
72 episodes
1 week ago
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability.
Show more...
Technology
RSS
All content for Error Code is the property of Robert Vamosi and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability.
Show more...
Technology
Episodes (20/72)
Error Code
E71: Meeting Cybersecurity Requirements That Don’t Yet Exist
The EU’s new Cyber Resilience Act (CRA) sets higher security requirements but leaves many technical details undecided. This puts pressure on vendors of connected or software-based products to either redesign, retrofit, or withdraw from the market. According to Roland Marx, Senior Product Manager at Swissbit, the CRA’s three-year rollout is meant to give companies time to adapt while regulators finalize the specifics.
Show more...
1 week ago
47 minutes

Error Code
EP70: Securing Medical Devices You Might Not Have Thought to Secure
Healthcare organizations are prone to the same weaknesses that any other office or manufacturing site may have. Sonu Shankar, Chief Product Officer at Phosphorus Cybersecurity, explains how the devices you might not suspect might be the ones to bring down your organization if they’re not secured. That includes the printer used to print patient wristbands.
Show more...
3 weeks ago
33 minutes

Error Code
EP 69: Adding Crypto Agility to OT Systems
Quantum computers could break today’s encryption, leaving many OT systems—which often lack encryption entirely—at even greater risk. Dave Krauthamer, Field CTO at QuSecure, warns that nation-state attackers may target critical infrastructure like power, water, and food supplies first, making it urgent to adopt quantum-resistant cryptography across both IT and OT systems.
Show more...
1 month ago
39 minutes 35 seconds

Error Code
EP 68: Hacking Cruise Ships and Data Centers
This is a story where one maritime company found multiple vendors maintaining unrestricted VPN access to systems across a cruise vessel, exposing safety-critical functions to potential compromise. Bill Moore, CEO of Xona Systems, returns to Error Code to talk about how that company and others, such as data center operators, are recognizing their latent multiple-vendor OT exposure and learning how to address it today.
Show more...
1 month ago
33 minutes 21 seconds

Error Code
EP 67: Collateral Damage
Operational technology (OT) systems are no longer limited to nation-states; criminal groups and hacktivists now actively target these systems, often driven by financial or ideological motives. Kurt Gaudette, Vice President of Intelligence and Services at Dragos, explains why these systems might not even be the primary targets.
Show more...
2 months ago
23 minutes 27 seconds

Error Code
EP 66: Secure only the OT code that actually runs
Many organizations spend valuable security resources fixing vulnerabilities in code that never actually runs—an inefficient and often unnecessary effort. Jeff Williams, CTO and founder at Contrast Security, says that 62% of open source libraries included in software are never even loaded into memory, let alone executed. This means only 38% of libraries are typically active and worth prioritizing. 
Show more...
2 months ago
23 minutes 11 seconds

Error Code
EP 65: Hacking Critical Infrastructure Through Supply Chains
Critical Infrastructure software lacks the strict liability standards found in industries like automotive manufacturing, leading to minimal accountability for insecure products when they get exploited.  Alex Santos, CEO of Fortress Information Security, explains how they’re typically hired by buyers of ICS equipment—such as utilities—to assess and mitigate supply chain risks, including working with OEMs to improve security.
Show more...
3 months ago
30 minutes 22 seconds

Error Code
EP 64: Volt Typhoon
While cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there’s increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in centralized systems like utilities. Michael Welch,  managing director from MorganFranklin Cyber, discusses how Volt Typhoon and other attacks are living off the land, and lying in wait.
Show more...
3 months ago
43 minutes 44 seconds

Error Code
EP 63: Chief Hacking Officer
This is a story about a Chief Hacking Officer who draws on his expertise in physical and virtual security assessments—along with some intuitive AI-driven coding—to safeguard Operational Technology. Colin Murphy of Frenos and Mitnick Security talks about how some of his early assessment work with Kevin Mitnick is helping him with OT security today.
Show more...
3 months ago
27 minutes 4 seconds

Error Code
EP 62: Defending the Unknown in OT Security
ROI is always a tricky subject in cybersecurity. If you’re paying millions of dollars in securing your OT networks, you’d want to be able to show that it was worth it. Andrew Hural of UnderDefense talks about the need for continuous vigilance, risk management, and proactive defense, acknowledging both the human and technological elements in cybersecurity and how just because something didn’t happen doesn’t mean that it didn’t.
Show more...
4 months ago
31 minutes 38 seconds

Error Code
EP 61: Applying Zero Trust to OT systems
Zero Trust is a security model based on default-deny policies and fine-grained access control governed by identity, authentication, and contextual signals. For RSAC 2025, John Kindervag, Chief Evangelist of Illumio and the creator of Zero Trust, talks about introducing a "protect surface" into legacy OT systems —isolating critical data, applications, assets, or services into secure zones for targeted Zero Trust implementation.
Show more...
4 months ago
36 minutes 7 seconds

Error Code
EP 60: Hacking Solar Power Inverters
Solar power systems are rapidly becoming essential elements of power grids throughout the world, especially in the US and EU. However, cybersecurity for these systems is often an afterthought, creating a growing risk to grid stability and availability. Daniel de Santos, Head of Research at ForeScout, talks about his recent research into vulnerabilities associated with solar panel investors, how they might affect the power grid or the end-user, and what we can do about it.
Show more...
5 months ago
39 minutes 21 seconds

Error Code
EP 59: Automotive Hacking In Your Own Garage
Gone are the days when you could repair your own car. Even ICE cars have more electronics than ever before. Alexander Pick is an independent hardware hacker specializing in automotive systems. He says if you start off small, like looking at ECUs, there’s a lot of great research yet to be done by both hobbyists and professionals alike.
Show more...
5 months ago
36 minutes 15 seconds

Error Code
EP 58: Hacking Office Supplies
It’s becoming easier for criminals to use counterfeit or altered chips in common office products, such as printer toner cartridges, with the aim of espionage or simple financial gain. Tony Moore, Senior Director Of Silicon Lab Services For IOActive, explains how the hacking embedded silicon within common objects in our day to day lives is becoming more common, and what the consequences of this lack of security might mean.
Show more...
6 months ago
45 minutes 42 seconds

Error Code
EP 57: Strengthening Embedded Device Security with Cloud-Based SCADA
Embedded devices need basic security measures like multi-factor authentication and unique credentials to reduce vulnerabilities and protect against cyber threats. Mauritz Botha, co-founder and CTO of XiO Inc., explains that cloud-based SCADA can update old systems and provide the visibility that’s currently missing.
Show more...
6 months ago
33 minutes 36 seconds

Error Code
EP 56: Hacking OT and ICS in the Era of Cloud and Automation
As industrial enterprises lurch toward digital transformation and Industry 4.0, a new report looks at the security OT systems and finds it wanting. Grant Geyer, the Chief Strategy Officer for Claroty, talks about the findings from over one million devices in the field today, and what industries must do now to secure them.
Show more...
7 months ago
42 minutes 19 seconds

Error Code
EP 55: Building Secure Storage for Autonomous Vehicles
I recently rode in a Waymo, Google’s self-driving taxi service, and it was fantastic. What if we took that vehicle off the safe roads of California and put it in a warzone like Ukraine? If it was captured, could the enemy get its data or its algorithms? Brent Hansen, Chief Growth Officer at Cigent, talks about the data risks associated with autonomous vehicles and remote servers, and how data security is essential in these in the field locations.
Show more...
7 months ago
28 minutes 48 seconds

Error Code
EP 54: From Cyber Chaos to Control: Lessons from a Kansas Water District
Imagine your best worst day during a cyber attack. Can you switch to manual systems in case of a failure? Has your team practiced for that?
Show more...
8 months ago
34 minutes 1 second

Error Code
EP 53: Securing Smart OT Systems Already In The Field
This is the story of how the security of OT devices in the field can be modernized virtual isolation in the cloud, adding both authentication and encryption into the mix. Bill Moore, founder and CEO of Xona, explains how you can virtualize the OT network and interact with it, adding 2FA and encryption to legacy systems already in the field.
Show more...
8 months ago
31 minutes 17 seconds

Error Code
EP 52: Hacking Cellular-Enabled IoT Devices
This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.
Show more...
9 months ago
37 minutes 59 seconds

Error Code
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability.