Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
In this episode of the Kill Chain Podcast hosts Terry Reinert and Marcus Q discuss new technologies aimed at preventing theft of cargo and vehicles.
Want to learn more about securing your fleets, pla…
In this episode of the Kill Chain Podcast hosts Marcus Q and Terry Reinert discuss the current state of telematics and where the technology is heading. We dive into the different data layers involved…
In this week's episode of the Kill Chain podcast hosts Terry Reinert and Marcus Q discuss the use of AI in creating automotive insurance policies and rates. The evolving field of AI can create more p…
In this week's episode of the Kill Chain podcast hosts Terry Reinert and Marcus Q discuss the evolution of vehicle software and how over-the-air updates can be a game-changer for vehicle manufacturer…
In this week's episode of the Kill Chain Podcast hosts Terry Reinert and Marcus Q discuss how a breach of an OT system can compromise a business's enterprise network. We discuss the ways in which att…
In this weeks episode of the Kill Chain podcast hosts Terry Reinert, Marcus Q, and Kendall Bricko answer listener questions. We answer and discuss our most asked listener questions including why some…
In this episode of the Kill Chain podcast hosts Marcus Q, Kendall Bricko, and AI expert Daniel Kovach discuss their experience at AutoTech Detroit. Kendall and Daniel discuss the innovations and limi…
In this episode of the Kill Chain Podcast hosts Marcus Q and Kendall Bricko bring on Fleet Defender's Director of Technology and AI expert, Daniel Kovach. Daniel has spent 10+ years working in the ar…
In this episode of the Kill Chain Podcast host Marcus Q discusses the risks and vulnerabilities in construction and heavy equipment with cyber warfare expert Terry Reinert. The discussion includes so…
In this episode of the Kill Chain Podcast hosts Marcus Q discusses recent research by Dr. Ken Tindell of Canis Automotive Labs with Terry Reinert, offensive cyberwarfare expert and CEO of Fleet Defen…
This week the team discusses simple and often free cybersecurity tools for small businesses. We dive into the strategies, methods, and applications that small businesses can use to protect against ra…
The Stuxnet computer worm is infamous for its infiltration of the Iranian nuclear program. Stuxnet targeted air-gapped systems to affect physical equipment and cause destruction well beyond destroyin…
This week the Fleet Defender team discusses the meaning of Level 0 - 5 autonomy for autonomous vehicles. The team dives into some of the existing and future technologies surrounding autonomous vehicl…
Do you know the story behind the infamous 2013 Target data breach? It involves an email and an HVAC system.
Briefs are short stories of famous and infamous hacks, exploits, and vulnerabilities that h…
The Fleet Defender team discusses the rush to launch satellites into Low Earth Orbit (LEO) and how the data collected in LEO is fueling the space economy.
Want to learn more about securing your fleet…
A kid, a computer, and a manhunt put on by the attorney general. This is the story of Mafiaboy and how he helped kickstart the cybersecurity industry after his infamous DoS attack against the world's…
This week the Fleet Defender crew discusses the different hacks that are possible on both information technology (IT) and operational technology (OT) systems and how to defend against them. The team …
The Fleet Defender team discusses popular buzzwords in the world of cybersecurity and decodes them for people outside of the cyber industry. This episodes dives into what a kill chain is, zero-day vu…
The team discusses the future of connected agriculture equipment and how bad actors can and are hacking US Agriculture. The team discusses some of the advancements in AgTech as seen in our home state…
In this episode host Terry Reinert discusses the existing and known vulnerabilities to vehicle cybersecurity and how both good and bad actors have exploited these vulnerabilities. The team dives into…