Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
The OT and IoT Security Podcast - The Verkada IoT Security Camera Attack – How Did Hackers Get In?

The Verkada IoT Security Camera Attack – How Did Hackers Get In?

04/14/21 • 5 min

The OT and IoT Security Podcast

IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this.

Visit Our Website
Follow Us on LinkedIn

plus icon
bookmark

IoT security camera provider Verkada was the target of a recent attack. Hackers gained access to the live video feeds of 150,000 surveillance cameras used by their customers. The attack showed the risks involved in leveraging IoT devices within business operations. In this short episode, find out what happened during the recent security breach, and what common practices can open the door to attacks like this.

Visit Our Website
Follow Us on LinkedIn

Previous Episode

undefined - Improving Transportation System Operational Visibility and Security

Improving Transportation System Operational Visibility and Security

The number of devices used in Intelligent Transportation Systems (ITSs) is exploding. Unfortunately, this high level of connectivity and network complexity has created an expanded attack surface with many vulnerabilities. Join us to learn about security challenges faced by metro systems, maritime transportation and logistics, and how to gain deeper operational visibility, prevent downtime and detect cyber threats.

Visit Our Website
Follow Us on LinkedIn

Next Episode

undefined - How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program

How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program

U.S. regulators are looking into how business operators maintain effective cybersecurity. The incoming Security of Critical Infrastructure legislative amendments will no doubt lead to an increased security compliance regime for any country.

Companies everywhere should proactively develop a robust cybersecurity compliance program – not because of legislation but because it’s good security hygiene and practice. How can you prepare for that now?

Join with us as we explore:

  • The steps involved in building out a Risk & Compliance Program
  • Effective design, implementation and response components
  • Building a quality ecosystem that supports identifying, managing and mitigating risks
  • Gathering intelligence for making evidence-based decisions
  • Ensuring your time and effort leads to a quality outcome

Visit Our Website
Follow Us on LinkedIn

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/the-ot-and-iot-security-podcast-233714/the-verkada-iot-security-camera-attack-how-did-hackers-get-in-26217131"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to the verkada iot security camera attack – how did hackers get in? on goodpods" style="width: 225px" /> </a>

Copy