Operational technology (OT) sits at the heart of modern society. From power generation and water treatment to manufacturing plants and data centers, OT systems keep the physical world running. But securing these environments is fundamentally different from securing...
How do you protect critical infrastructure—the systems that keep the lights on, water flowing, and communities functioning—from threats that span cyberspace, geopolitics, and emerging technology? That’s the question host Paul Ducklin explored with Joseph M. Saunders,...
AI is now woven into the everyday workflows of embedded engineers. It writes code, generates tests, reviews logs, and scans for vulnerabilities. But the same tools that speed up development are introducing new risks—many of which can compromise the stability of...
When people picture AI in defense, they usually imagine automated drones, robotic soldiers, or high-stakes scenarios at the edge of conflict. But generative AI’s biggest impact today isn’t on the front lines at all but in the workflows, decisions, and systems behind...
Meeting ICS cybersecurity standards, such as IEC 62443 and NIST 800-82, requires more than just documenting policies or checking boxes. Industrial control systems rely on complex, layered software stacks—much of it legacy, third-party, or built with older...