36 episodes

Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability.

Error Code Robert Vamosi

    • Technology
    • 5.0 • 7 Ratings

Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability.

    EP 35: Outsized Kinetic Response to OT Attacks

    EP 35: Outsized Kinetic Response to OT Attacks

    If you knock down an email server, you could stand up a parallel server or you could find workarounds. If you knock down a factory floor, there is no real parallel, alternative to a factory floor.

    • 39 min
    EP 34: Quantifying Risk in IoT and OT Systems

    EP 34: Quantifying Risk in IoT and OT Systems

    One of the problems with security is ROI. If I put in next gen this and next gen that and no security events happen, am I justified in making those expenditures? How do you quantify a risk like that?

    • 40 min
    EP 33: Turning EDRs and Cloud Backups to Malicious Wipers

    EP 33: Turning EDRs and Cloud Backups to Malicious Wipers

    This is the story of how a researcher turns commercial and commonly used EDRs and Cloud-based backup systems into wipers against the very data they’re designed to protect.

    • 32 min
    EP 32: Using ChatGPT To Perform Side Channel Attacks On Real Hardware

    EP 32: Using ChatGPT To Perform Side Channel Attacks On Real Hardware

    There’s a lot of talk about using AI and LLM in security. For example, could ChatGPT detect the vulnerable spots for power for analysis in particular pieces of code using Advanced Encryption Standard?

    • 30 min
    EP 31: How Operation Volt Typhoon Shows That IoT & OT Devices Could Be Used In Cyberwarfare

    EP 31: How Operation Volt Typhoon Shows That IoT & OT Devices Could Be Used In Cyberwarfare

    You might think that internet connected cameras would be limited in use by a bad actor. Actually such devices can be an entry point into an organization, providing yet another means of accessing the internal network.

    • 43 min
    EP 30: Of IoT Vulnerabilities and Consumer IoT Labels

    EP 30: Of IoT Vulnerabilities and Consumer IoT Labels

    There’s a fake new report about three million internet-enabled toothbrushes contributing to a botnet. Unfortunately the mainstream media ran with the story before questioning its basic assumptions.

    • 43 min

Customer Reviews

5.0 out of 5
7 Ratings

7 Ratings

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
This Week in XR Podcast
Charlie Fink Productions

You Might Also Like

Security Now (Audio)
TWiT
Darknet Diaries
Jack Rhysider
Windows Weekly (Audio)
TWiT
Click Here
Recorded Future News
Malicious Life
Malicious Life
Hacked
Hacked