Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

After DEF CON: What the Maritime Hacking Village Revealed About Real-World ICS Risk

Автор: RunSafe Security Inc.

Загружено: 2025-08-14

Просмотров: 140

Описание:

DEF CON 33 put the maritime industry in the hacker’s crosshairs for the first time and the results were eye-opening. In this episode of Exploited: The Cyber Truth, host Paul Ducklin sits down with Joe Saunders, CEO of RunSafe Security, and RunSafe’s Shiv Saxena to unpack what happened inside the Maritime Hacking Village and what it means for the future of industrial control systems (ICS) and operational technology (OT) security.

From breaking into an autonomous narco sub and a real-world port crane to candid discussions about legacy system vulnerabilities, the conversation dives into the most surprising takeaways from Las Vegas—and why they matter for national security.

You’ll hear:

• What DEF CON revealed about ICS and OT risks
• How maritime pros are rethinking security priorities
• Why legacy code and memory safety remain urgent challenges
• The role public hacking events play in strengthening critical infrastructure defenses

Whether you were there in person or following from afar, this insider debrief delivers lessons every security leader can act on now.

After DEF CON: What the Maritime Hacking Village Revealed About Real-World ICS Risk

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Эпизод 15: От класса к карьере: План округа C по решению реальных проблем

Эпизод 15: От класса к карьере: План округа C по решению реальных проблем

Atskats uz 2025. gadu: Cik tuvu ASV ir autoritārismam? Ukrainas noturības gads. Gazas kara bilance.

Atskats uz 2025. gadu: Cik tuvu ASV ir autoritārismam? Ukrainas noturības gads. Gazas kara bilance.

Что обнаружено после взлома разработчика электронных повесток?

Что обнаружено после взлома разработчика электронных повесток?

Volt Typhoon and the Risk to Critical Infrastructure

Volt Typhoon and the Risk to Critical Infrastructure

“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler | SpyCast

“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler | SpyCast

When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats

When Machines Get Hacked: A Manufacturer’s Guide to Embedded Threats

When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems

When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Weapons Cybersecurity: The Challenges Facing Aerospace and Defense

Weapons Cybersecurity: The Challenges Facing Aerospace and Defense

Clean Files, Safe Operations: Defending Federal and OT Systems from AI-Driven Threats

Clean Files, Safe Operations: Defending Federal and OT Systems from AI-Driven Threats

Cybersecurity Trends for 2025 and Beyond

Cybersecurity Trends for 2025 and Beyond

Spy Chat with Chris Costa | Special Guest: Paul Whelan

Spy Chat with Chris Costa | Special Guest: Paul Whelan

When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next

When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next

Risk Reduction at the Core: Securing the Firmware Supply Chain

Risk Reduction at the Core: Securing the Firmware Supply Chain

Collaboration in Cyberspace with Madison Horn

Collaboration in Cyberspace with Madison Horn

Почему люди покупают НЕ те ноутбуки для хакинга

Почему люди покупают НЕ те ноутбуки для хакинга

Can Taiwan Survive a Digital Siege?

Can Taiwan Survive a Digital Siege?

What is a Zero Day Threat?

What is a Zero Day Threat?

Quantifying Zero-Day Risk with Binary Analysis | Doug Britton, RunSafe Security (THREATCON1)

Quantifying Zero-Day Risk with Binary Analysis | Doug Britton, RunSafe Security (THREATCON1)

What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security

What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]