<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Hackwerk</title>
		<link>https://shows.acast.com/hackwerk</link>
		<atom:link href="https://feeds.acast.com/public/shows/612f26ffeb5bf70014a48447" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Mirko Ross</copyright>
		<itunes:keywords>Cybersecurity,Infosecurity,Hacking,Cybersec,Infosec,Cyberwar,Ransomware,Malware,Worm,Darknet,Hacker,Cyberattack,Cyber,Cyberpunk,Blackhat</itunes:keywords>
		<itunes:author>Mirko Ross</itunes:author>
		<itunes:subtitle>The Cybersecurity Show</itunes:subtitle>
		<itunes:summary><![CDATA[<p>She is a former Cybersecurity Professional for the US Gov, he was a hacker. Tyler Cohen Wood and Mirko Ross are the hosts of Hackwerk. Together, they talk with guests about the most pressing and urgent Cybersecurity topics of our time. Hackwerk will take the audience on a mind-blowing Cybersecurity journey: entertaining, serious, incredible, awesome, shocking, head-exploding… listen.</p><br><p>Visit us at www.hackwerk.io</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[<p>She is a former Cybersecurity Professional for the US Gov, he was a hacker. Tyler Cohen Wood and Mirko Ross are the hosts of Hackwerk. Together, they talk with guests about the most pressing and urgent Cybersecurity topics of our time. Hackwerk will take the audience on a mind-blowing Cybersecurity journey: entertaining, serious, incredible, awesome, shocking, head-exploding… listen.</p><br><p>Visit us at www.hackwerk.io</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Mirko Ross</itunes:name>
			<itunes:email>info+612f26ffeb5bf70014a48447@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
		<acast:showUrl>hackwerk</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="60076951795a1c638da17e76" slug="mirko-ross"><![CDATA[Mirko Ross]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg</url>
				<link>https://shows.acast.com/hackwerk</link>
				<title>Hackwerk</title>
			</image>
		<item>
			<title>Lost in the Metaverse</title>
			<itunes:title>Lost in the Metaverse</itunes:title>
			<pubDate>Tue, 20 Dec 2022 19:53:17 GMT</pubDate>
			<itunes:duration>47:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/63a20b097815420010736a0f/media.mp3" length="68604759" type="audio/mpeg"/>
			<guid isPermaLink="false">63a20b097815420010736a0f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwerk.io</link>
			<acast:episodeId>63a20b097815420010736a0f</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>lost-in-the-metaverse</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK764L42/K+oDcWLFWUp2G9bQsZcoT2jgK3aup68ozBCGSKD7s9C7er4N/5/VTMLVuHD75trEtIkvGpbainCpUP62C]]></acast:settings>
			<itunes:subtitle>Is the Metaverse a story of glory or just a misunderstanding?</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>Let’s talk about the biggest hype of 2023: the Metaverse. Is this just a big marketing BS bubble, or has the Metaverse the potential to something big next thing?</strong></p><br><p>In this episode of Hackwerk.io we are discussing the Metaverse from A (like AR) to Z (like Zen) with two fantastic guests: Kevin O’Donovan and Cyril Coste</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Shownotes:</strong></p><br><p>Kevin O’Donovan on LinkedIn: <a href="https://www.linkedin.com/in/kevinodonovan/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/kevinodonovan/</a></p><p>Cyril Coste on LinkedIn: <a href="https://www.linkedin.com/in/cyrilcoste/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/cyrilcoste/</a></p><p>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>Some AR / VR / meta resources:</strong></p><br><p>William Gibson, the godfather of cyberspace: <a href="https://en.wikipedia.org/wiki/William_Gibson" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/William_Gibson</a></p><p>&nbsp;</p><p>A historic view on VR Multiuser Worlds in the Internet: VRML</p><p><a href="https://web.archive.org/web/20090321032205/http:/vrmlworks.crispen.org/cyberspace.html" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20090321032205/http://vrmlworks.crispen.org/cyberspace.html</a></p><p>&nbsp;</p><p>Snow Crash, the famous – what can go wrong in the metaverse – book by Neal Stephenson: <a href="https://en.wikipedia.org/wiki/Snow_Crash" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Snow_Crash</a></p><p>&nbsp;</p><p>Metaverse by Meta: <a href="https://about.meta.com/metaverse/" rel="noopener noreferrer" target="_blank">https://about.meta.com/metaverse/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Let’s talk about the biggest hype of 2023: the Metaverse. Is this just a big marketing BS bubble, or has the Metaverse the potential to something big next thing?</strong></p><br><p>In this episode of Hackwerk.io we are discussing the Metaverse from A (like AR) to Z (like Zen) with two fantastic guests: Kevin O’Donovan and Cyril Coste</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Shownotes:</strong></p><br><p>Kevin O’Donovan on LinkedIn: <a href="https://www.linkedin.com/in/kevinodonovan/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/kevinodonovan/</a></p><p>Cyril Coste on LinkedIn: <a href="https://www.linkedin.com/in/cyrilcoste/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/cyrilcoste/</a></p><p>&nbsp;</p><p><strong>&nbsp;</strong></p><p><strong>Some AR / VR / meta resources:</strong></p><br><p>William Gibson, the godfather of cyberspace: <a href="https://en.wikipedia.org/wiki/William_Gibson" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/William_Gibson</a></p><p>&nbsp;</p><p>A historic view on VR Multiuser Worlds in the Internet: VRML</p><p><a href="https://web.archive.org/web/20090321032205/http:/vrmlworks.crispen.org/cyberspace.html" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20090321032205/http://vrmlworks.crispen.org/cyberspace.html</a></p><p>&nbsp;</p><p>Snow Crash, the famous – what can go wrong in the metaverse – book by Neal Stephenson: <a href="https://en.wikipedia.org/wiki/Snow_Crash" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Snow_Crash</a></p><p>&nbsp;</p><p>Metaverse by Meta: <a href="https://about.meta.com/metaverse/" rel="noopener noreferrer" target="_blank">https://about.meta.com/metaverse/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cybersecurity Influencer</title>
			<itunes:title>Cybersecurity Influencer</itunes:title>
			<pubDate>Sat, 16 Jul 2022 14:36:05 GMT</pubDate>
			<itunes:duration>41:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/62d2c94fc589900012083df3/media.mp3" length="35492678" type="audio/mpeg"/>
			<guid isPermaLink="false">62d2c94fc589900012083df3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwerk.io</link>
			<acast:episodeId>62d2c94fc589900012083df3</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>cybersecurity-influencer</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK764w+jQNMKPxJYI5mU0TFc1ypDYf0mRCIUmSBNE+wQ1AHDVesQsxf/a2JT2gfc7vgpksTvned6Yvd3nqwe4DvMY7]]></acast:settings>
			<itunes:subtitle>The difference between thought leadership and marketing BS</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>What is the difference between cybersecurity thought leadership and traditional online marketing? And WFT, why some people are called cybersecurity influencer? </strong></p><p><strong>&nbsp;</strong></p><p>In this episode we discuss the difference between influential people and marketing influencer in Cybersecurity. </p><p>&nbsp;</p><p>Gosh… and we need to discuss why Tyler and Mirko are rated as cybersecurity influencer in influencer marketing reports…</p><p>&nbsp;</p><p>We’ve got some good answers from <a href="https://www.linkedin.com/in/yael-moav/" rel="noopener noreferrer" target="_blank">Yael Moav</a>. Yael is a professional Cybersecurity Influencer Marketing expert, engaging with Cyfluencer on influencer marketing in cybersecurity space.</p><p>&nbsp;</p><p>This episode is dedicated to cybersecurity thought leaders, influencer marketing experts and the all the wanna be cybersecurity influencers </p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Hosts of this Episode:</strong></p><p> </p><p> Tyler Cohen Wood: <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/tylercohen78/</a></p><p>&nbsp;</p><p>Mirko Ross: <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/mirko-ross/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Guest</strong></p><p>Yael Moav: <a href="https://www.linkedin.com/in/yael-moav/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/yael-moav/</a></p><p>&nbsp;</p><p><strong>Show notes:</strong></p><p>&nbsp;</p><p>Yael on LinkendIn: <a href="https://www.linkedin.com/in/yael-moav/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/yael-moav/</a></p><p>&nbsp;</p><p>Cyfluencer: <a href="https://cyfluencer.com/" rel="noopener noreferrer" target="_blank">https://cyfluencer.com/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>What is the difference between cybersecurity thought leadership and traditional online marketing? And WFT, why some people are called cybersecurity influencer? </strong></p><p><strong>&nbsp;</strong></p><p>In this episode we discuss the difference between influential people and marketing influencer in Cybersecurity. </p><p>&nbsp;</p><p>Gosh… and we need to discuss why Tyler and Mirko are rated as cybersecurity influencer in influencer marketing reports…</p><p>&nbsp;</p><p>We’ve got some good answers from <a href="https://www.linkedin.com/in/yael-moav/" rel="noopener noreferrer" target="_blank">Yael Moav</a>. Yael is a professional Cybersecurity Influencer Marketing expert, engaging with Cyfluencer on influencer marketing in cybersecurity space.</p><p>&nbsp;</p><p>This episode is dedicated to cybersecurity thought leaders, influencer marketing experts and the all the wanna be cybersecurity influencers </p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Hosts of this Episode:</strong></p><p> </p><p> Tyler Cohen Wood: <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/tylercohen78/</a></p><p>&nbsp;</p><p>Mirko Ross: <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/mirko-ross/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Guest</strong></p><p>Yael Moav: <a href="https://www.linkedin.com/in/yael-moav/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/yael-moav/</a></p><p>&nbsp;</p><p><strong>Show notes:</strong></p><p>&nbsp;</p><p>Yael on LinkendIn: <a href="https://www.linkedin.com/in/yael-moav/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/yael-moav/</a></p><p>&nbsp;</p><p>Cyfluencer: <a href="https://cyfluencer.com/" rel="noopener noreferrer" target="_blank">https://cyfluencer.com/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Computer to Brain Interfaces</title>
			<itunes:title>Computer to Brain Interfaces</itunes:title>
			<pubDate>Mon, 18 Apr 2022 06:20:05 GMT</pubDate>
			<itunes:duration>52:01</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/625cfc0dd6d937001499f51e/media.mp3" length="44674456" type="audio/mpeg"/>
			<guid isPermaLink="false">625cfc0dd6d937001499f51e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/hackwerk/episodes/computer-to-brain-interfaces</link>
			<acast:episodeId>625cfc0dd6d937001499f51e</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>computer-to-brain-interfaces</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK765+KdKGC/2khYKtZUC4olCCf/0V3Fv0Z678X3aHHtpPztBTbq0whQ/UYvr+CdgsteUxx7lAEZIOEkJ/t6VJYGTq]]></acast:settings>
			<itunes:subtitle>A chip in your brain conntecting the web</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>A chip in your brain, connected to web. Sounds fascinating but also scary from cybersecurity perspective. </strong></p><p>&nbsp;</p><p>Computer to brain interfaces is a promising technology in medicine to help people suffering from fatal diseases as locked-in Syndrome or Parkinson. </p><p>&nbsp;</p><p>Tech Startups Neuralink dreaming beyond medical application towards connecting the brain with the web, extending the human mind to the metaverse. In this episode we are talking with the brain researcher and psychiatry expert Knut Schnell about the history of Computer to Brain Interfaces, the currents state of the technology and the outlook.</p><p>&nbsp;</p><p><strong>Hosts of this Episode:</strong></p><p> </p><p><a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a></p><p><a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Guest</strong></p><p><a href="https://www.linkedin.com/in/knut-schnell-b927b269/" rel="noopener noreferrer" target="_blank">Knut Schnell</a></p><p>&nbsp;</p><p><strong>Show notes:</strong></p><p>&nbsp;</p><ul><li>Knut Schnell on LinkendIn: <a href="https://www.linkedin.com/in/knut-schnell-b927b269/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/knut-schnell-b927b269/</a></li></ul><p><br></p><ul><li>Brain-To-Computer Inferfaces are Coming, Will we be ready? <a href="https://www.rand.org/blog/articles/2020/08/brain-computer-interfaces-are-coming-will-we-be-ready.html" rel="noopener noreferrer" target="_blank">https://www.rand.org/blog/articles/2020/08/brain-computer-interfaces-are-coming-will-we-be-ready.html</a></li></ul><p><br></p><ul><li>Physicians Group Files State Lawsuit and Federal Complaint Against UC Davis Regarding Deadly Monkey Experiments at Elon Musk-Funded Lab: <a href="https://www.pcrm.org/news/news-releases/physicians-group-files-state-lawsuit-and-federal-complaint-against-uc-davis" rel="noopener noreferrer" target="_blank">https://www.pcrm.org/news/news-releases/physicians-group-files-state-lawsuit-and-federal-complaint-against-uc-davis</a></li></ul><p>&nbsp;</p><p>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>A chip in your brain, connected to web. Sounds fascinating but also scary from cybersecurity perspective. </strong></p><p>&nbsp;</p><p>Computer to brain interfaces is a promising technology in medicine to help people suffering from fatal diseases as locked-in Syndrome or Parkinson. </p><p>&nbsp;</p><p>Tech Startups Neuralink dreaming beyond medical application towards connecting the brain with the web, extending the human mind to the metaverse. In this episode we are talking with the brain researcher and psychiatry expert Knut Schnell about the history of Computer to Brain Interfaces, the currents state of the technology and the outlook.</p><p>&nbsp;</p><p><strong>Hosts of this Episode:</strong></p><p> </p><p><a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a></p><p><a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>Guest</strong></p><p><a href="https://www.linkedin.com/in/knut-schnell-b927b269/" rel="noopener noreferrer" target="_blank">Knut Schnell</a></p><p>&nbsp;</p><p><strong>Show notes:</strong></p><p>&nbsp;</p><ul><li>Knut Schnell on LinkendIn: <a href="https://www.linkedin.com/in/knut-schnell-b927b269/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/knut-schnell-b927b269/</a></li></ul><p><br></p><ul><li>Brain-To-Computer Inferfaces are Coming, Will we be ready? <a href="https://www.rand.org/blog/articles/2020/08/brain-computer-interfaces-are-coming-will-we-be-ready.html" rel="noopener noreferrer" target="_blank">https://www.rand.org/blog/articles/2020/08/brain-computer-interfaces-are-coming-will-we-be-ready.html</a></li></ul><p><br></p><ul><li>Physicians Group Files State Lawsuit and Federal Complaint Against UC Davis Regarding Deadly Monkey Experiments at Elon Musk-Funded Lab: <a href="https://www.pcrm.org/news/news-releases/physicians-group-files-state-lawsuit-and-federal-complaint-against-uc-davis" rel="noopener noreferrer" target="_blank">https://www.pcrm.org/news/news-releases/physicians-group-files-state-lawsuit-and-federal-complaint-against-uc-davis</a></li></ul><p>&nbsp;</p><p>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Botnets - The Most Dangerous Threat from the Internet</title>
			<itunes:title>Botnets - The Most Dangerous Threat from the Internet</itunes:title>
			<pubDate>Fri, 18 Mar 2022 12:56:42 GMT</pubDate>
			<itunes:duration>46:24</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/6234807641e0be001220a271/media.mp3" length="39331591" type="audio/mpeg"/>
			<guid isPermaLink="false">6234807641e0be001220a271</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwerk.io</link>
			<acast:episodeId>6234807641e0be001220a271</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>botnets-the-most-dangerous-threat-from-the-internet</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK765RZR5jdbg63oPYFVNPBIQCyREbe2S7Xyo2Zj6bMt4fUdMfGnTwgYJvfuuRv6mzJgvth4wvMLqXjdbLiOJnoGBt]]></acast:settings>
			<itunes:subtitle>In this episode we cover with our guest Philippe Humeau how botnets are controlled and their capabilities</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>Botnets are on of the biggest threats from the internet. We are talking with cybersecurity expert Philippe Humeau about botnets, cover their capabilities and how botnets are controlled.</strong></p><br><p><strong>Host of this episode:</strong></p><p><a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><strong>About our guest:</strong></p><p><a href="https://www.linkedin.com/in/philippehumeau/" rel="noopener noreferrer" target="_blank">Philippe Humeau</a> graduated in 1999 as IT security engineer from EPITA (Paris, France). He founded his first company at the same time and quickly oriented it towards penetration testing and high-security hosting. He was also deeply involved in Magento’s community creation &amp; animation in France and versed in eCommerce (wrote 4 books on the topic). In 2020, he founded CrowdSec, a company editing an eponymous open-source&nbsp;and collaborative IPS, leveraging both IP behavior &amp; reputation to create a community and tackle the mass scale hacking problem. His crushes will forever be IT security, DevSecOps, and entrepreneurship.</p><br><p><strong>Shownotes:</strong></p><p>Mirai botnet authors avoid jail time: <a href="https://krebsonsecurity.com/2018/09/mirai-botnet-authors-avoid-jail-time/" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2018/09/mirai-botnet-authors-avoid-jail-time/</a></p><p>CrowdSec website: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbk4zY2k2UzFiS3JDTV92UzFTdVczejBMN09Sd3xBQ3Jtc0tuZ2ROTUUyUzBWcDlRYlNsX2Z0anQzZkRiVXUtVTIzajRnbXNrMTl3VjIyTmJnVm9RMnllNGxpQl9RVm1zNXVMSnlHZFZiQXBpeGZqeW5XT1NVVjNFZnFGS1VaX3JBZi1veGFsakJMeXZocGxKWHV5bw&amp;q=https%3A%2F%2Fcrowdsec.net%2F" rel="noopener noreferrer" target="_blank">https://crowdsec.net/</a></p><p>CrowdSec GitHub: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbG1nZVZCdklGdmw0MVpJWjJFOUhqazVXQncxd3xBQ3Jtc0tsa1BaZDU5VjNjWTBTaXRnTGJXdjZYSnd1VWtCM2NUaHdJcExYYU9rYlFrM0VUN21zMjBPVGNlMFlnYTA5VU4yOGU0YkF4WDdaT0d0X0x1bGV5RndRVXRrNDVaSUVEVkJ3Z1dVbUVtdUZJR1JBa3ZUWQ&amp;q=https%3A%2F%2Fgithub.com%2Fcrowdsecurity%2Fcrowdsec" rel="noopener noreferrer" target="_blank">https://github.com/crowdsecurity/crowdsec</a></p><p>CrowdSec explained in 15 minutes by Philippe&nbsp;➜&nbsp;<a href="https://www.youtube.com/watch?v=d9NgZBldnos" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=d9NgZBldnos</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Botnets are on of the biggest threats from the internet. We are talking with cybersecurity expert Philippe Humeau about botnets, cover their capabilities and how botnets are controlled.</strong></p><br><p><strong>Host of this episode:</strong></p><p><a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><strong>About our guest:</strong></p><p><a href="https://www.linkedin.com/in/philippehumeau/" rel="noopener noreferrer" target="_blank">Philippe Humeau</a> graduated in 1999 as IT security engineer from EPITA (Paris, France). He founded his first company at the same time and quickly oriented it towards penetration testing and high-security hosting. He was also deeply involved in Magento’s community creation &amp; animation in France and versed in eCommerce (wrote 4 books on the topic). In 2020, he founded CrowdSec, a company editing an eponymous open-source&nbsp;and collaborative IPS, leveraging both IP behavior &amp; reputation to create a community and tackle the mass scale hacking problem. His crushes will forever be IT security, DevSecOps, and entrepreneurship.</p><br><p><strong>Shownotes:</strong></p><p>Mirai botnet authors avoid jail time: <a href="https://krebsonsecurity.com/2018/09/mirai-botnet-authors-avoid-jail-time/" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2018/09/mirai-botnet-authors-avoid-jail-time/</a></p><p>CrowdSec website: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbk4zY2k2UzFiS3JDTV92UzFTdVczejBMN09Sd3xBQ3Jtc0tuZ2ROTUUyUzBWcDlRYlNsX2Z0anQzZkRiVXUtVTIzajRnbXNrMTl3VjIyTmJnVm9RMnllNGxpQl9RVm1zNXVMSnlHZFZiQXBpeGZqeW5XT1NVVjNFZnFGS1VaX3JBZi1veGFsakJMeXZocGxKWHV5bw&amp;q=https%3A%2F%2Fcrowdsec.net%2F" rel="noopener noreferrer" target="_blank">https://crowdsec.net/</a></p><p>CrowdSec GitHub: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbG1nZVZCdklGdmw0MVpJWjJFOUhqazVXQncxd3xBQ3Jtc0tsa1BaZDU5VjNjWTBTaXRnTGJXdjZYSnd1VWtCM2NUaHdJcExYYU9rYlFrM0VUN21zMjBPVGNlMFlnYTA5VU4yOGU0YkF4WDdaT0d0X0x1bGV5RndRVXRrNDVaSUVEVkJ3Z1dVbUVtdUZJR1JBa3ZUWQ&amp;q=https%3A%2F%2Fgithub.com%2Fcrowdsecurity%2Fcrowdsec" rel="noopener noreferrer" target="_blank">https://github.com/crowdsecurity/crowdsec</a></p><p>CrowdSec explained in 15 minutes by Philippe&nbsp;➜&nbsp;<a href="https://www.youtube.com/watch?v=d9NgZBldnos" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=d9NgZBldnos</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Connected Cars</title>
			<itunes:title>Connected Cars</itunes:title>
			<pubDate>Sat, 05 Feb 2022 07:00:23 GMT</pubDate>
			<itunes:duration>54:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/61fe208822c3440012ce9503/media.mp3" length="46509905" type="audio/mpeg"/>
			<guid isPermaLink="false">61fe208822c3440012ce9503</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwerk.io</link>
			<acast:episodeId>61fe208822c3440012ce9503</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>connected-cars</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK764OA2KH+9J1d94YKOpScDJB34fHZ/2GcYKo6c0zyuNK640M/jfwB2wnu2AMJmLY70rrGydnwWjGaY9Elo69Cj0i]]></acast:settings>
			<itunes:subtitle>Cybersecurity for vehicles - managing vulnerabilities and risks</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>The furture of cars is connected. This leads into increased attack surfaces for vehicles owners and the automotive industry. We talk with automotive cybersecurity expert </strong><a href="https://www.linkedin.com/in/johnheldreth/" rel="noopener noreferrer" target="_blank"><strong>John Heldreth</strong></a><strong> about the threats for automotive due hacking, cybercriminals and nation state actors.</strong></p><br><p>John is co-founder of the <a href="https://www.asrg.io/" rel="noopener noreferrer" target="_blank">Automotive Security Research Group</a> (asrg), an open community of automotive cybersecurity and saftey expert with more than 7.000 members worldwide.</p><br><p><strong>Hosts of this show:</strong> <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><br></p><p><strong>Shownotes:</strong></p><p>John on linkedIn: <a href="https://www.linkedin.com/in/johnheldreth/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnheldreth/</a></p><p>Automotive Security Research Group: <a href="https://www.asrg.io/" rel="noopener noreferrer" target="_blank">https://www.asrg.io/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>The furture of cars is connected. This leads into increased attack surfaces for vehicles owners and the automotive industry. We talk with automotive cybersecurity expert </strong><a href="https://www.linkedin.com/in/johnheldreth/" rel="noopener noreferrer" target="_blank"><strong>John Heldreth</strong></a><strong> about the threats for automotive due hacking, cybercriminals and nation state actors.</strong></p><br><p>John is co-founder of the <a href="https://www.asrg.io/" rel="noopener noreferrer" target="_blank">Automotive Security Research Group</a> (asrg), an open community of automotive cybersecurity and saftey expert with more than 7.000 members worldwide.</p><br><p><strong>Hosts of this show:</strong> <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><br></p><p><strong>Shownotes:</strong></p><p>John on linkedIn: <a href="https://www.linkedin.com/in/johnheldreth/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/johnheldreth/</a></p><p>Automotive Security Research Group: <a href="https://www.asrg.io/" rel="noopener noreferrer" target="_blank">https://www.asrg.io/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Social Engineering</title>
			<itunes:title>Social Engineering</itunes:title>
			<pubDate>Thu, 20 Jan 2022 19:08:57 GMT</pubDate>
			<itunes:duration>51:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/61e9b0c65d42500013f36d1f/media.mp3" length="43326647" type="audio/mpeg"/>
			<guid isPermaLink="false">61e9b0c65d42500013f36d1f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwer.io</link>
			<acast:episodeId>61e9b0c65d42500013f36d1f</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>social-engineering</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK7670N9Aoc0GXOcLoZYdW8I9vqFwd52N6TPeYBum1LxY3zHa2E4GtBpMzDbhHSqd9XOixICy98YKuwhv4SoMrHEsg]]></acast:settings>
			<itunes:subtitle><![CDATA[Attacking the human's weak point]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>We talk with Christina Lekati on psychological elements and behavioural science involved to perform cyber attacks by social engineering.</strong></p><br><p><a href="https://www.linkedin.com/in/christina-lekati-social-engineering/" rel="noopener noreferrer" target="_blank">Christina Lekati</a> is a psychologist and a social engineer. She specializes in the mechanisms of behavior, motivation, decision making, manipulation and deceit. She is an expert in human dynamics and passionate about social engineering.</p><br><p>Hosts of this Show: <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><strong>Shownotes:</strong></p><p>Christina on: <a href="https://www.linkedin.com/in/christina-lekati-social-engineering/" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://twitter.com/ChristinaLekati" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Professional profile and CV of Christina at CyberRisk: <a href="https://www.social-engineering-training.ch/" rel="noopener noreferrer" target="_blank">https://www.social-engineering-training.ch/</a></p><p>Interview in TAZ Newspaper (Germany): <a href="https://taz.de/Sicherheitsexpertin-ueber-Social-Engineering/!5711020/" rel="noopener noreferrer" target="_blank">https://taz.de/Sicherheitsexpertin-ueber-Social-Engineering/!5711020/</a></p><p>Presentation at ElBsides Hamburg: "When Your Biggest Threat is on Your Payroll – Drivers and Enablers of Insider Threat Activities": <a href="https://www.youtube.com/watch?v=5ovY0YlLZNU&amp;t=2208s" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=5ovY0YlLZNU&amp;t=2208s</a></p><p>Presentation at Hacktivity: "Social Engineering Through Social Media": <a href="https://www.youtube.com/watch?v=D8Z69AsSFn0&amp;t=577s" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=D8Z69AsSFn0&amp;t=577s</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>We talk with Christina Lekati on psychological elements and behavioural science involved to perform cyber attacks by social engineering.</strong></p><br><p><a href="https://www.linkedin.com/in/christina-lekati-social-engineering/" rel="noopener noreferrer" target="_blank">Christina Lekati</a> is a psychologist and a social engineer. She specializes in the mechanisms of behavior, motivation, decision making, manipulation and deceit. She is an expert in human dynamics and passionate about social engineering.</p><br><p>Hosts of this Show: <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><strong>Shownotes:</strong></p><p>Christina on: <a href="https://www.linkedin.com/in/christina-lekati-social-engineering/" rel="noopener noreferrer" target="_blank">LinkedIn</a> and <a href="https://twitter.com/ChristinaLekati" rel="noopener noreferrer" target="_blank">Twitter</a></p><p>Professional profile and CV of Christina at CyberRisk: <a href="https://www.social-engineering-training.ch/" rel="noopener noreferrer" target="_blank">https://www.social-engineering-training.ch/</a></p><p>Interview in TAZ Newspaper (Germany): <a href="https://taz.de/Sicherheitsexpertin-ueber-Social-Engineering/!5711020/" rel="noopener noreferrer" target="_blank">https://taz.de/Sicherheitsexpertin-ueber-Social-Engineering/!5711020/</a></p><p>Presentation at ElBsides Hamburg: "When Your Biggest Threat is on Your Payroll – Drivers and Enablers of Insider Threat Activities": <a href="https://www.youtube.com/watch?v=5ovY0YlLZNU&amp;t=2208s" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=5ovY0YlLZNU&amp;t=2208s</a></p><p>Presentation at Hacktivity: "Social Engineering Through Social Media": <a href="https://www.youtube.com/watch?v=D8Z69AsSFn0&amp;t=577s" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=D8Z69AsSFn0&amp;t=577s</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Pirates of the Digital Sea</title>
			<itunes:title>Pirates of the Digital Sea</itunes:title>
			<pubDate>Fri, 07 Jan 2022 10:20:34 GMT</pubDate>
			<itunes:duration>46:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/61d813f33ccaf80013cc0aa7/media.mp3" length="39066292" type="audio/mpeg"/>
			<guid isPermaLink="false">61d813f33ccaf80013cc0aa7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwerk.io</link>
			<acast:episodeId>61d813f33ccaf80013cc0aa7</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>pirate-of-the-digital-sea</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK764hhCOU4xVcvgWLpYhLpEivg2p47kNObdIRRuRdiJlhg+KrzbzTLvAU+Oilug5w0VOofI+iz/8ACjOnqBma4Iy/]]></acast:settings>
			<itunes:subtitle>Commons of ransomware gangs and pirates of the caribian. Walk the cyber plank, err!</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1641666490737-e55445566040a112f806b8f8bff59890.jpeg"/>
			<description><![CDATA[<p><strong>Err! This episode we talk with </strong><a href="https://www.linkedin.com/in/paulwmoor/" rel="noopener noreferrer" target="_blank"><strong>Paul Oor </strong></a><strong>about the golden era of Pirates: from the past and what they have in common with today's cybercrime as ransomeware gangs.</strong></p><p><strong>So, let's walk the plank and get fascinated by historic analogies of pirates nests, asymetric warfare and letters fo marque.</strong></p><br><p>Guest: <a href="https://www.linkedin.com/in/paulwmoor/" rel="noopener noreferrer" target="_blank">Paul Oor</a></p><p>Hosts: <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><strong>Shownotes:</strong></p><p><a href="https://www.linkedin.com/in/paulwmoor/" rel="noopener noreferrer" target="_blank">Paul Oor on LinkedIn<strong>: </strong>https://www.linkedin.com/in/paulwmoor/</a></p><p>Podcast woth Paul and PwC Luxembourg: <a href="https://www.pwc.lu/en/podcasts-tech-talks.html" rel="noopener noreferrer" target="_blank">https://www.pwc.lu/en/podcasts-tech-talks.html</a></p><p>Article by Paul , "CEO's enabling CISO's" : <a href="https://isaca.nl/opinieartikel/ceos-enabling-cisos/" rel="noopener noreferrer" target="_blank">https://isaca.nl/opinieartikel/ceos-enabling-cisos/</a></p><p>Article by Paul, "learn from Piracy':&nbsp;<a href="https://isaca.nl/nieuws/cisos-enabling-business/" rel="noopener noreferrer" target="_blank">https://isaca.nl/nieuws/cisos-enabling-business/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Err! This episode we talk with </strong><a href="https://www.linkedin.com/in/paulwmoor/" rel="noopener noreferrer" target="_blank"><strong>Paul Oor </strong></a><strong>about the golden era of Pirates: from the past and what they have in common with today's cybercrime as ransomeware gangs.</strong></p><p><strong>So, let's walk the plank and get fascinated by historic analogies of pirates nests, asymetric warfare and letters fo marque.</strong></p><br><p>Guest: <a href="https://www.linkedin.com/in/paulwmoor/" rel="noopener noreferrer" target="_blank">Paul Oor</a></p><p>Hosts: <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><br><p><strong>Shownotes:</strong></p><p><a href="https://www.linkedin.com/in/paulwmoor/" rel="noopener noreferrer" target="_blank">Paul Oor on LinkedIn<strong>: </strong>https://www.linkedin.com/in/paulwmoor/</a></p><p>Podcast woth Paul and PwC Luxembourg: <a href="https://www.pwc.lu/en/podcasts-tech-talks.html" rel="noopener noreferrer" target="_blank">https://www.pwc.lu/en/podcasts-tech-talks.html</a></p><p>Article by Paul , "CEO's enabling CISO's" : <a href="https://isaca.nl/opinieartikel/ceos-enabling-cisos/" rel="noopener noreferrer" target="_blank">https://isaca.nl/opinieartikel/ceos-enabling-cisos/</a></p><p>Article by Paul, "learn from Piracy':&nbsp;<a href="https://isaca.nl/nieuws/cisos-enabling-business/" rel="noopener noreferrer" target="_blank">https://isaca.nl/nieuws/cisos-enabling-business/</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>2022 Outlook for Cybersecurity (Live)</title>
			<itunes:title>2022 Outlook for Cybersecurity (Live)</itunes:title>
			<pubDate>Thu, 30 Dec 2021 20:44:37 GMT</pubDate>
			<itunes:duration>1:07:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/61ce18511b91cf0012aeff3e/media.mp3" length="56935960" type="audio/mpeg"/>
			<guid isPermaLink="false">61ce18511b91cf0012aeff3e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>http://www-hackwerk.io</link>
			<acast:episodeId>61ce18511b91cf0012aeff3e</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>2022-outlook-for-cybersecurity-live</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK766gbnrkq1XOw0WrbdYzIPyq8vXf9ptyk6SFmFWlDL6SraCRcPQaS2RgUSNMKUCYwZplirr2m5wTyiRZlGtAwXwU]]></acast:settings>
			<itunes:subtitle>Twitter Spaces Live Show with Cybersecurity Fortune Tellers</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>This is the recording of our twitter spaces live show from 30.12.2022. We have invited cybersecurity industry &amp; social media experts to be the fortune tellers for 2022: what will be the most relevant cybersecurity and infosec topics in 2022?</strong></p><br><p>Listen to the show and the ideas of our guests on the stage:</p><br><p><a href="https://www.linkedin.com/in/avrohom-gottheil/" rel="noopener noreferrer" target="_blank"><strong>Avrohom Gottheil,</strong></a><strong> </strong><a href="https://www.linkedin.com/in/rpvmay/" rel="noopener noreferrer" target="_blank"><strong>Rob May</strong></a><strong> and </strong><a href="https://www.linkedin.com/in/evankirstel/" rel="noopener noreferrer" target="_blank"><strong>Evan Kirstel.</strong></a></p><br><p>As this was a live show on twitter spaces, we apologize for some audio quality struggles, keyboard noises and barking dogs... it is the live show madness ;)</p><br><p>Enjoy the conversation and we wish you a happy new year 2022!</p><br><p>Your hackwerk.io hosts <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>This is the recording of our twitter spaces live show from 30.12.2022. We have invited cybersecurity industry &amp; social media experts to be the fortune tellers for 2022: what will be the most relevant cybersecurity and infosec topics in 2022?</strong></p><br><p>Listen to the show and the ideas of our guests on the stage:</p><br><p><a href="https://www.linkedin.com/in/avrohom-gottheil/" rel="noopener noreferrer" target="_blank"><strong>Avrohom Gottheil,</strong></a><strong> </strong><a href="https://www.linkedin.com/in/rpvmay/" rel="noopener noreferrer" target="_blank"><strong>Rob May</strong></a><strong> and </strong><a href="https://www.linkedin.com/in/evankirstel/" rel="noopener noreferrer" target="_blank"><strong>Evan Kirstel.</strong></a></p><br><p>As this was a live show on twitter spaces, we apologize for some audio quality struggles, keyboard noises and barking dogs... it is the live show madness ;)</p><br><p>Enjoy the conversation and we wish you a happy new year 2022!</p><br><p>Your hackwerk.io hosts <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> &amp; <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Internet of Lost Identities</title>
			<itunes:title>The Internet of Lost Identities</itunes:title>
			<pubDate>Tue, 21 Dec 2021 16:38:45 GMT</pubDate>
			<itunes:duration>57:04</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/61c203153376e900127a2f66/media.mp3" length="48288949" type="audio/mpeg"/>
			<guid isPermaLink="false">61c203153376e900127a2f66</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/hackwerk/episodes/the-internet-of-lost-identities</link>
			<acast:episodeId>61c203153376e900127a2f66</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>the-internet-of-lost-identities</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK765d9b4LjqbCobLDOpMQbE9lL1dZHaQmkAiwtEmrStOsIRvlGT/frhCd7r28tXtOegGrAQa3KPUQaAQGCMbs9IaB]]></acast:settings>
			<itunes:subtitle><![CDATA["To be or not to be, that is the questions" -What is identity and why digital ID often get lost or stolen?]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><em>"Something claims to be something and that this is authenticating with something... identies are always something about relationships".</em> </p><p>In this episode <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler</a> and <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko</a> are talking with the digital identity experts <a href="https://www.linkedin.com/in/lornagoulden/" rel="noopener noreferrer" target="_blank">Lorna Goulden</a> and <a href="https://www.linkedin.com/in/robvankranenburg/" rel="noopener noreferrer" target="_blank">Rob van Kranenburg</a> about the role of digital identies and how to build a cybersecure digital identity.</p><br><p><strong>Learn more about the Rob, Lorna and the concept of Disposable Identities at:</strong></p><p><br></p><ul><li><em>The Future Show Now: A third way: Self Sovereign Identity and Disposable Identities</em>, Rob van Kranenburg, <a href="https://www.youtube.com/watch?v=fPzwgQKke6E" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=fPzwgQKke6E</a></li></ul><p><br></p><ul><li><em>The Cybersecurity Aspects of New Entities Need a Cybernetic, Holistic Perspective</em>, Rob van Kranenburg &amp; Gaelle Le Gars, <a href="https://www.researchgate.net/publication/351804704_The_Cybersecurity_Aspects_of_New_Entities_Need_a_Cybernetic_Holistic_Perspective" rel="noopener noreferrer" target="_blank">https://www.researchgate.net/publication/351804704_The_Cybersecurity_Aspects_of_New_Entities_Need_a_Cybernetic_Holistic_Perspective</a></li></ul><p><br></p><ul><li>Twinds Foundation: <a href="https://twinds.org/" rel="noopener noreferrer" target="_blank">https://twinds.org/</a></li></ul><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><em>"Something claims to be something and that this is authenticating with something... identies are always something about relationships".</em> </p><p>In this episode <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler</a> and <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko</a> are talking with the digital identity experts <a href="https://www.linkedin.com/in/lornagoulden/" rel="noopener noreferrer" target="_blank">Lorna Goulden</a> and <a href="https://www.linkedin.com/in/robvankranenburg/" rel="noopener noreferrer" target="_blank">Rob van Kranenburg</a> about the role of digital identies and how to build a cybersecure digital identity.</p><br><p><strong>Learn more about the Rob, Lorna and the concept of Disposable Identities at:</strong></p><p><br></p><ul><li><em>The Future Show Now: A third way: Self Sovereign Identity and Disposable Identities</em>, Rob van Kranenburg, <a href="https://www.youtube.com/watch?v=fPzwgQKke6E" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=fPzwgQKke6E</a></li></ul><p><br></p><ul><li><em>The Cybersecurity Aspects of New Entities Need a Cybernetic, Holistic Perspective</em>, Rob van Kranenburg &amp; Gaelle Le Gars, <a href="https://www.researchgate.net/publication/351804704_The_Cybersecurity_Aspects_of_New_Entities_Need_a_Cybernetic_Holistic_Perspective" rel="noopener noreferrer" target="_blank">https://www.researchgate.net/publication/351804704_The_Cybersecurity_Aspects_of_New_Entities_Need_a_Cybernetic_Holistic_Perspective</a></li></ul><p><br></p><ul><li>Twinds Foundation: <a href="https://twinds.org/" rel="noopener noreferrer" target="_blank">https://twinds.org/</a></li></ul><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Artificial Intelligence (AI) and Cybersecurity</title>
			<itunes:title>Artificial Intelligence (AI) and Cybersecurity</itunes:title>
			<pubDate>Fri, 10 Dec 2021 13:14:25 GMT</pubDate>
			<itunes:duration>34:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/61b352b276271a00151dc1fe/media.mp3" length="29006910" type="audio/mpeg"/>
			<guid isPermaLink="false">61b352b276271a00151dc1fe</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwerk.io</link>
			<acast:episodeId>61b352b276271a00151dc1fe</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>artificial-intelligence-ai-and-cybersecurity</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK767Uo2xR0aM9VC9R+zluUSUL9/JuSvrtCCddBQwsDrNe+t241CnK22FyVsYqf4RPRYzGU70y22AWwEtOJ+tWpp8m]]></acast:settings>
			<itunes:subtitle>DAVE, This mission is too important for me to allow you to jeopardize it.</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>Artificial Intelligence (AI) and cybersecurity, what can go wrong? Together with AI cybersecurity expert </strong><a href="https://www.linkedin.com/in/cybersecurityprivacyforbuildingtrustholistically/" rel="noopener noreferrer" target="_blank"><strong>Pamela Gupta</strong></a><strong> we bring light to super complicated topic: What ist the promise and value of AI and can we build trustworthy and cybersecure AI applications.</strong></p><br><p>So, as HAL9000 in Space Odyssey said: <em>"This mission is too important for me to allow you to jeopardize it."</em></p><br><p>Hosting this show: <a href="https://www.linkedin.com/in/cybersecurityprivacyforbuildingtrustholistically/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> and <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a>.</p><br><p><strong>About our guest Pamela Gupta:</strong></p><br><p><a href="https://www.linkedin.com/in/pamelagupta/o" rel="noopener noreferrer" target="_blank">Pamela Gupta</a>, MSc is CEO and President of <a href="https://www.outsecure.com/" rel="noopener noreferrer" target="_blank">OutSecure</a> and Chief Security Strategist at <a href="https://vcisoservices.com/about-us" rel="noopener noreferrer" target="_blank">Virtual CISO</a>.</p><p>Pamela earned a Masters in Artificial Intelligence at the University of Bridgeport in 1997. She has certification in CSSLP, CISM, and CISSP.</p><br><p>Pamela serves as a Global Chief Information Security Officer and Cyber Security Consultant for clients across industries, working with multinationals and Fortune 500 companies. As CEO of OutSecure, she excels at identifying exposures to current cybersecurity risks for companies. OutSecure’s clients rely on them to prioritize risks and develop adequate risk mitigation so that their business can expand and grow. </p><br><p>As Founding Member at <a href="https://www.iotsecurityfoundation.org/" rel="noopener noreferrer" target="_blank">IoT Security Foundation</a>, she collaborates with users across industries to ensure IoT applications are secure systemwide. Pamela is also Member of <a href="https://otalliance.org/" rel="noopener noreferrer" target="_blank">Online Trust Alliance</a>, Founder and Board Member of <a href="https://www.isc2.org/" rel="noopener noreferrer" target="_blank">(ISC)2</a>, and Coach at <a href="https://www.firstinspires.org/" rel="noopener noreferrer" target="_blank">FIRST</a>. </p><br><p>Pamela has extensive experience in cybersecurity. She has worked as Global Information Security Officer at Avon, Information Security Officer at Higher One, Director Information Security Risk at Starwood Hotels &amp; Resorts Worldwide, Security Architect at Time Warner, and Security Analyst at Prudential Securities.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Artificial Intelligence (AI) and cybersecurity, what can go wrong? Together with AI cybersecurity expert </strong><a href="https://www.linkedin.com/in/cybersecurityprivacyforbuildingtrustholistically/" rel="noopener noreferrer" target="_blank"><strong>Pamela Gupta</strong></a><strong> we bring light to super complicated topic: What ist the promise and value of AI and can we build trustworthy and cybersecure AI applications.</strong></p><br><p>So, as HAL9000 in Space Odyssey said: <em>"This mission is too important for me to allow you to jeopardize it."</em></p><br><p>Hosting this show: <a href="https://www.linkedin.com/in/cybersecurityprivacyforbuildingtrustholistically/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> and <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a>.</p><br><p><strong>About our guest Pamela Gupta:</strong></p><br><p><a href="https://www.linkedin.com/in/pamelagupta/o" rel="noopener noreferrer" target="_blank">Pamela Gupta</a>, MSc is CEO and President of <a href="https://www.outsecure.com/" rel="noopener noreferrer" target="_blank">OutSecure</a> and Chief Security Strategist at <a href="https://vcisoservices.com/about-us" rel="noopener noreferrer" target="_blank">Virtual CISO</a>.</p><p>Pamela earned a Masters in Artificial Intelligence at the University of Bridgeport in 1997. She has certification in CSSLP, CISM, and CISSP.</p><br><p>Pamela serves as a Global Chief Information Security Officer and Cyber Security Consultant for clients across industries, working with multinationals and Fortune 500 companies. As CEO of OutSecure, she excels at identifying exposures to current cybersecurity risks for companies. OutSecure’s clients rely on them to prioritize risks and develop adequate risk mitigation so that their business can expand and grow. </p><br><p>As Founding Member at <a href="https://www.iotsecurityfoundation.org/" rel="noopener noreferrer" target="_blank">IoT Security Foundation</a>, she collaborates with users across industries to ensure IoT applications are secure systemwide. Pamela is also Member of <a href="https://otalliance.org/" rel="noopener noreferrer" target="_blank">Online Trust Alliance</a>, Founder and Board Member of <a href="https://www.isc2.org/" rel="noopener noreferrer" target="_blank">(ISC)2</a>, and Coach at <a href="https://www.firstinspires.org/" rel="noopener noreferrer" target="_blank">FIRST</a>. </p><br><p>Pamela has extensive experience in cybersecurity. She has worked as Global Information Security Officer at Avon, Information Security Officer at Higher One, Director Information Security Risk at Starwood Hotels &amp; Resorts Worldwide, Security Architect at Time Warner, and Security Analyst at Prudential Securities.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Crypto, Crime & Fraud]]></title>
			<itunes:title><![CDATA[Crypto, Crime & Fraud]]></itunes:title>
			<pubDate>Thu, 25 Nov 2021 17:02:24 GMT</pubDate>
			<itunes:duration>43:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/6197dae5c0ce660015985423/media.mp3" length="36644544" type="audio/mpeg"/>
			<guid isPermaLink="false">6197dae5c0ce660015985423</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>http://www.hackwerk.io</link>
			<acast:episodeId>6197dae5c0ce660015985423</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>crypto-crime-fraud</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK767CFKPbW8nmm/f0PVxacB/rdV5CblizrC2PTsApNwZ1vXkisCvurzBSv0yITMTSDPiu4KvVk7qGFXHS7PXXcQTh]]></acast:settings>
			<itunes:subtitle>The dark side of crypto currencies</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>Imagine you have a look on your wallet and all the crypto currencies asstets vanish...</strong></p><br><p>With the rise of bitcoin we see also the rise of crypto crime and fraud. In this episode of <a href="https://www.hackwerk.io" rel="noopener noreferrer" target="_blank">hackwerk.io</a> we discuss with our guest <a href="https://www.linkedin.com/in/koen-maris/" rel="noopener noreferrer" target="_blank">Koen Maris</a> the impact of Crypto crime from Mt. Gox towards the IOTA seed fraud scheme. Koen share his insights from forensic work in Ccypto space with the show hosts <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> and <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a>.</p><br><p><strong>About our guest Koen Maris:</strong></p><br><p>Koen Maris started an IT career as a software developer. This experience provided solid background in multi tier environments and a basis in the roll-out of complex IT projects. After a few years, he swapped development for ethical hacking because of a natural curiosity to find how systems fail. The start of technical career in IT security, however due to rise of security problems his career evolved from ethical hacking to security solutions integration and eventually to the more managerial side of security.</p><br><p>He has been CISO and security officer preceding his current role (since 2015) as a Chief Technology Officer at Atos for the region Benelux and the Nordics. He advices large organizations in a multi-industry environment to think on a long-term basis on Cyber Security and addresses complex security topics in layman terms for board of directors and executive committees.</p><br><p>Koen Maris serves as a trusted advisor for many organizations as the IOTA foundation and is becoming a known speaker that challenges his audience and questions current applied security models.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Imagine you have a look on your wallet and all the crypto currencies asstets vanish...</strong></p><br><p>With the rise of bitcoin we see also the rise of crypto crime and fraud. In this episode of <a href="https://www.hackwerk.io" rel="noopener noreferrer" target="_blank">hackwerk.io</a> we discuss with our guest <a href="https://www.linkedin.com/in/koen-maris/" rel="noopener noreferrer" target="_blank">Koen Maris</a> the impact of Crypto crime from Mt. Gox towards the IOTA seed fraud scheme. Koen share his insights from forensic work in Ccypto space with the show hosts <a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank">Tyler Cohen Wood</a> and <a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank">Mirko Ross</a>.</p><br><p><strong>About our guest Koen Maris:</strong></p><br><p>Koen Maris started an IT career as a software developer. This experience provided solid background in multi tier environments and a basis in the roll-out of complex IT projects. After a few years, he swapped development for ethical hacking because of a natural curiosity to find how systems fail. The start of technical career in IT security, however due to rise of security problems his career evolved from ethical hacking to security solutions integration and eventually to the more managerial side of security.</p><br><p>He has been CISO and security officer preceding his current role (since 2015) as a Chief Technology Officer at Atos for the region Benelux and the Nordics. He advices large organizations in a multi-industry environment to think on a long-term basis on Cyber Security and addresses complex security topics in layman terms for board of directors and executive committees.</p><br><p>Koen Maris serves as a trusted advisor for many organizations as the IOTA foundation and is becoming a known speaker that challenges his audience and questions current applied security models.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Blackout - Attacking The Power Grid</title>
			<itunes:title>Blackout - Attacking The Power Grid</itunes:title>
			<pubDate>Thu, 11 Nov 2021 17:07:17 GMT</pubDate>
			<itunes:duration>40:11</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/618ac65ac75a7d0013bce593/media.mp3" length="34110202" type="audio/mpeg"/>
			<guid isPermaLink="false">618ac65ac75a7d0013bce593</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.hackwerk.io</link>
			<acast:episodeId>618ac65ac75a7d0013bce593</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>blackout-attacking-the-power-grid</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK764UW9lqsA1tz3OkyDEJ0ujuJNYNlCgGEi6ANuS+6ZwxbOQ4Fy4u4nAwsLSp+274+XSx72Z8rR4L4rzqEi3NVEC8]]></acast:settings>
			<itunes:subtitle>Discussing with Harm van der Brink the Cybersecurity Threats on Power Supply.</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>Can you use a fleet of hacked smart devices to force a nationwide power blackout? Our guest and</strong><a href="https://www.linkedin.com/in/harm-van-den-brink-ba1a1143/" rel="noopener noreferrer" target="_blank"><strong> expert Harm van den Brink</strong></a><strong> says YES.</strong></p><br><p><a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank"><strong>Tyler Cohen Wood </strong></a><strong>and </strong><a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank"><strong>Mirko Ross</strong></a><strong> are discussing with the power grid and electric vehicle cybersecurity expert Harm van der Brink on the challenges to defend the power grids from being attacked.</strong></p><br><p><strong>Shownotes:</strong></p><br><p>Read more from Harm on his Medium articles:</p><br><p><a href="https://medium.com/codex/the-cyber-security-challenges-of-the-internet-of-energy-5b6fc966dba7" rel="noopener noreferrer" target="_blank">https://medium.com/codex/the-cyber-security-challenges-of-the-internet-of-energy-5b6fc966dba7</a></p><br><p>A button to switch off our entire electricity grid? We are creating one with unsecure high-power connected devices. Should we worry about it? The more high power devices (home appliances) are connected to the grid, the more we should worry about our grid stability and the availability of power. We should have cyber security in place before millions of those devices will be added to the grid. The regulation should be done on (at least) the European level.</p><br><p><br></p><p><a href="https://harmvandenbrink.medium.com/a-european-wide-blackout-almost-e5b7ed2a6cfb" rel="noopener noreferrer" target="_blank">https://harmvandenbrink.medium.com/a-european-wide-blackout-almost-e5b7ed2a6cfb</a></p><br><p>Luckily almost nobody noticed it, but last Friday, 8th of January, at 14:05 CET the whole of Europe was on the brink of a total blackout. Due to an instant loss of energy production, the frequency (see it as the heartbeat of the grid) fell below the critical threshold. Such a high deviation is rarely seen on European grids. The frequency should be as close to 50Hz as possible for a smooth running grid. This time it dropped to 49.74, very close to a catastrophic failure.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Can you use a fleet of hacked smart devices to force a nationwide power blackout? Our guest and</strong><a href="https://www.linkedin.com/in/harm-van-den-brink-ba1a1143/" rel="noopener noreferrer" target="_blank"><strong> expert Harm van den Brink</strong></a><strong> says YES.</strong></p><br><p><a href="https://www.linkedin.com/in/tylercohen78/" rel="noopener noreferrer" target="_blank"><strong>Tyler Cohen Wood </strong></a><strong>and </strong><a href="https://www.linkedin.com/in/mirko-ross/" rel="noopener noreferrer" target="_blank"><strong>Mirko Ross</strong></a><strong> are discussing with the power grid and electric vehicle cybersecurity expert Harm van der Brink on the challenges to defend the power grids from being attacked.</strong></p><br><p><strong>Shownotes:</strong></p><br><p>Read more from Harm on his Medium articles:</p><br><p><a href="https://medium.com/codex/the-cyber-security-challenges-of-the-internet-of-energy-5b6fc966dba7" rel="noopener noreferrer" target="_blank">https://medium.com/codex/the-cyber-security-challenges-of-the-internet-of-energy-5b6fc966dba7</a></p><br><p>A button to switch off our entire electricity grid? We are creating one with unsecure high-power connected devices. Should we worry about it? The more high power devices (home appliances) are connected to the grid, the more we should worry about our grid stability and the availability of power. We should have cyber security in place before millions of those devices will be added to the grid. The regulation should be done on (at least) the European level.</p><br><p><br></p><p><a href="https://harmvandenbrink.medium.com/a-european-wide-blackout-almost-e5b7ed2a6cfb" rel="noopener noreferrer" target="_blank">https://harmvandenbrink.medium.com/a-european-wide-blackout-almost-e5b7ed2a6cfb</a></p><br><p>Luckily almost nobody noticed it, but last Friday, 8th of January, at 14:05 CET the whole of Europe was on the brink of a total blackout. Due to an instant loss of energy production, the frequency (see it as the heartbeat of the grid) fell below the critical threshold. Such a high deviation is rarely seen on European grids. The frequency should be as close to 50Hz as possible for a smooth running grid. This time it dropped to 49.74, very close to a catastrophic failure.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Internet of Broken Things</title>
			<itunes:title>Internet of Broken Things</itunes:title>
			<pubDate>Sun, 10 Oct 2021 06:30:44 GMT</pubDate>
			<itunes:duration>51:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/612f26ffeb5bf70014a48447/e/616288948f804a0013866e52/media.mp3" length="44246647" type="audio/mpeg"/>
			<guid isPermaLink="false">616288948f804a0013866e52</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/hackwerk/episodes/internet-of-broken-things</link>
			<acast:episodeId>616288948f804a0013866e52</acast:episodeId>
			<acast:showId>612f26ffeb5bf70014a48447</acast:showId>
			<acast:episodeUrl>internet-of-broken-things</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZslzCn9OWronFglQppI5gM3zuBr+LFENmYHsYHT0rK766Dddo10TMkYyB0FP1+/GQ7+mw4NCc4UcG2PX6NDzEYJfHPgagvaXLAK2tKzxIEiFhRMTTIThwJLI/lbkgXigIH]]></acast:settings>
			<itunes:subtitle><![CDATA[Let's talk about the (In)Security in IoT]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/612f26ffeb5bf70014a48447/1632144078151-24d27055c02df1829d6f603df4988ccc.jpeg"/>
			<description><![CDATA[<p><strong>Why is Cybersecurity in Internet of Things is broken</strong> and what is needed to protect consumers and industries from vulnerabilities in IoT? And <strong>why major botnets are still based on a mass of Zombie IoT devices</strong>? At <a href="http://www.hackwerk.io" rel="noopener noreferrer" target="_blank">hackwerk.io</a> <strong> </strong>the hosts <strong>Tyler Cohen Wood </strong>and <strong>Mirko Ross </strong>are discussion this with their guests.</p><br><p><br></p><p>The two IoT Experts in this show:</p><br><p><strong>Rob Tiffany</strong>, VP IoT at Ericsson and IoT Guru, Seattle</p><p><a href="https://www.linkedin.com/in/robtiffany/" rel="noopener noreferrer" target="_blank">LinkedIn</a>; <a href="https://twitter.com/RobTiffany" rel="noopener noreferrer" target="_blank">Twitter</a></p><br><p><strong>Dimitri Volkmann,</strong> Executive Advisor, Novela Neurotech, Cupertino</p><p><a href="https://www.linkedin.com/in/dimitrivolkmann/" rel="noopener noreferrer" target="_blank">LinkedIn</a>; <a href="https://twitter.com/dimiexter" rel="noopener noreferrer" target="_blank">Twitter</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Why is Cybersecurity in Internet of Things is broken</strong> and what is needed to protect consumers and industries from vulnerabilities in IoT? And <strong>why major botnets are still based on a mass of Zombie IoT devices</strong>? At <a href="http://www.hackwerk.io" rel="noopener noreferrer" target="_blank">hackwerk.io</a> <strong> </strong>the hosts <strong>Tyler Cohen Wood </strong>and <strong>Mirko Ross </strong>are discussion this with their guests.</p><br><p><br></p><p>The two IoT Experts in this show:</p><br><p><strong>Rob Tiffany</strong>, VP IoT at Ericsson and IoT Guru, Seattle</p><p><a href="https://www.linkedin.com/in/robtiffany/" rel="noopener noreferrer" target="_blank">LinkedIn</a>; <a href="https://twitter.com/RobTiffany" rel="noopener noreferrer" target="_blank">Twitter</a></p><br><p><strong>Dimitri Volkmann,</strong> Executive Advisor, Novela Neurotech, Cupertino</p><p><a href="https://www.linkedin.com/in/dimitrivolkmann/" rel="noopener noreferrer" target="_blank">LinkedIn</a>; <a href="https://twitter.com/dimiexter" rel="noopener noreferrer" target="_blank">Twitter</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
		<itunes:category text="News">
			<itunes:category text="Tech News"/>
		</itunes:category>
		<itunes:category text="Society &amp; Culture">
			<itunes:category text="Documentary"/>
		</itunes:category>
    </channel>
</rss>
