Forsidebilde av showet Security Cocktail Hour

Security Cocktail Hour

Podkast av Joe Patti and Adam Roth

engelsk

Teknologi og vitenskap

Tidsbegrenset tilbud

2 Måneder for 19 kr

Deretter 99 kr / MånedAvslutt når som helst.

  • 20 timer lydbøker i måneden
  • Eksklusive podkaster
  • Gratis podkaster
Kom i gang

Les mer Security Cocktail Hour

Security veterans Joe Patti and Adam Roth welcome a diverse lineup of cybersecurity and information security experts to share their insights at the virtual bar. From cutting edge topics like AI and Operational Technology (OT) to the realities of careers and mental health, you'll get the inside view of what's happening across the industry and what it's really like to work in these fields, from the people who do it every day.Reach us at feedback@securitycocktailhour.com or @SecCocktailHour on Twitter.

Alle episoder

79 Episoder

episode Your Stolen Car Can Track Itself cover

Your Stolen Car Can Track Itself

Modern cars are phones with wheels: GPS, telematics, connected apps, and data streams that can expose privacy risks, but also help recover a stolen vehicle before it disappears across jurisdictions. Maria Santos and Eugene Giordani, co-founders of Autoscope, join the Security Cocktail Hour to explain how law enforcement can use consent-based access to connected-car data after a theft. We talk about relay attacks, key cloning, license plate reader limits, built-in GPS, jurisdiction problems, AirTags, immobilizers, Faraday bags, dash cams, and the practical steps car owners can take before something happens. If you care about cybersecurity, connected vehicles, public safety, privacy, or just keeping your car in your driveway, this one is for you. Website: https://securitycocktailhour.com [https://securitycocktailhour.com] LinkedIn: https://www.linkedin.com/company/security-cocktail-hour [https://www.linkedin.com/company/security-cocktail-hour] Twitter/X: @SecCocktailHour Enjoyed this episode? Follow us and share it with a colleague or friend who owns a connected car.

19. mai 2026 - 48 min
episode Drones Were Just the Beginning. Space Security Is Next. cover

Drones Were Just the Beginning. Space Security Is Next.

In this episode, Ché Bolden joins us to talk about drone security, uncrewed systems, satellite security, GPS, autonomy, counter-drone defense, and the growing cyber risks around space-based infrastructure. We get into how drones were originally secured, why unencrypted links were such a problem, how command-and-control attacks can work, and why space is now part of the security conversation. This conversation sits at the intersection of cyber security, drone warfare, satellite security, space security, and the future of connected systems. If you care about drones, satellites, GPS, cyber risk, or the security of critical infrastructure, this episode is worth a listen. Guest Ché Bolden Learn more: bolden.group interastra.institute

8. mai 2026 - 53 min
episode Zero Trust in Orbit: Getting Satellite Security Off the Ground | Joe South cover

Zero Trust in Orbit: Getting Satellite Security Off the Ground | Joe South

Joe South joins the Security Cocktail Hour to discuss the state of communication satellite security and the doctoral research he is doing to change it. Joe is Director of Cloud & AI Security at Abira Security and hosts the Security Unfiltered podcast, one of the larger independent cybersecurity podcasts. The conversation covers what satellite defense actually looks like today: why most of the security is at the ground station rather than on the satellite itself, what happens when CubeSats stay in orbit for 10 to 12 years without meaningful patching, and how a zero trust framework could be made to work on hardware that operates on less than three watts of power. Joe walks through his proposed approach, which combines TPM-based component authentication with a distributed trust ring across satellite orbits.We also get into cyber warfare and the attribution problem, the strategic implications of a compromised satellite fleet, and Joe's personal story about building self-sufficiency. If you work in cloud, infrastructure, or national security and have never had space in your threat model, this is a good place to start. Guest: Joe South, Director of Cloud & AI Security at Abira Security, host of Security Unfiltered (securityunfiltered.com), doctoral candidate at Capital Technology University.Subscribe to the Security Cocktail Hour newsletter at securitycocktailhour.com for a biweekly read on cybersecurity news and upcoming episodes.

20. april 2026 - 53 min
episode How Drones in Public Safety Went From "That's a Toy" to 1,000 Programs | Matt Sloane cover

How Drones in Public Safety Went From "That's a Toy" to 1,000 Programs | Matt Sloane

Matt Sloane has spent 13 years in the drone industry, working with over 1,000 public safety agencies to build and operate drone programs. As Co-Founder and Chief Strategy Officer of SkyfireAI, he's at the intersection of drone operations, AI-enabled autonomy, and national security policy. In this conversation, Matt covers how drone first response (DFR) programs are changing 911 operations, why the FAA's upcoming Part 108 framework will prioritize autonomy over human pilots, how counter-UAS mitigation actually works (with memorable stories from the Super Bowl and World Cup preparations), and what he told the White House about the Chinese drone ban's impact on American public safety agencies. Supply chain risk from Chinese-made drones mirrors the Hikvision and Huawei debates. Counter-UAS involves signal jamming and RF detection. Autonomous drone systems are expanding the attack surface in ways most security programs haven't accounted for yet.

6. april 2026 - 59 min
episode What Happens When an Iranian APT Targets You Personally | Amanda King cover

What Happens When an Iranian APT Targets You Personally | Amanda King

Amanda King was a Senior Director of Breakthrough Technology at an aerospace and defense company when she learned she was on a list of 77 people specifically targeted by Iran's Charming Kitten APT group. In this episode, she tells the full story: how the Associated Press tried to reach her three times, what the attackers accessed, how a US government agency got involved, and what she changed in her personal and professional life afterward. The conversation covers the real-world experience of being targeted by a nation-state actor, the gap between corporate and personal security, what it's like when a three-letter agency asks for access to your life, and how the experience shaped Amanda's approach as she moved into executive roles. Amanda also shares her perspective on resilience, including her cancer journey, and a practical framework for processing difficult experiences. Hosts: Joe Patti and Adam Roth. Recorded March 14, 2026.

23. mars 2026 - 40 min
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Liker at det er både Podcaster (godt utvalg) og lydbøker i samme app, pluss at man kan holde Podcaster og lydbøker atskilt i biblioteket.
Bra app. Oversiktlig og ryddig. MYE bra innhold⭐️⭐️⭐️

Velg abonnementet ditt

Mest populær

Tidsbegrenset tilbud

Premium

20 timer lydbøker

  • Eksklusive podkaster

  • Ingen annonser i Podimo shows

  • Avslutt når som helst

2 Måneder for 19 kr
Deretter 99 kr / Måned

Kom i gang

Premium Plus

100 timer lydbøker

  • Eksklusive podkaster

  • Ingen annonser i Podimo shows

  • Avslutt når som helst

Prøv gratis i 14 dager
Deretter 169 kr / måned

Prøv gratis

Bare på Podimo

Populære lydbøker

Kom i gang

2 Måneder for 19 kr. Deretter 99 kr / Måned. Avslutt når som helst.