Cybersecurity Under Pressure. Real Attacks, Real Lessons cover art

Cybersecurity Under Pressure. Real Attacks, Real Lessons

Cybersecurity Under Pressure. Real Attacks, Real Lessons

Written by: Antonio González
Listen for free

About this listen

This podcast breaks down real cybersecurity incidents to understand what actually went wrong, not in theory, but in practice. Each episode analyzes a recent attack, explains the technical mechanics in clear language, and translates them into concrete lessons for security, engineering, and business teams. The focus is on operational reality, decision making under pressure, and the controls that truly reduce risk in production environments.Antonio González
Episodes
  • The 18:45 Reflash: When Usability Friction Becomes a Threat
    Feb 25 2026

    In this new chapter of Cybersecurity Under Pressure. Real Attacks, Real Lessons, we tackle the dangerous intersection of operational friction and systems engineering. A dealership laptop starts a DoIP reflash at 18:45. The authentication portal lags, the technician forces a shared session to stay alive, and suddenly the trust chain is compromised by a manual workaround. This episode challenges the "IT vs. Workshop" divide, arguing that latency, token refresh rates, and bay throughput are strict security requirements. We discuss how to architect revocation as a safety-critical OT function using transactional flows and A/B partitions, and dive into formally verifying the backend-to-bootloader handshake as a robust state machine.

    Show More Show Less
    23 mins
  • The Friday Night Patch & The Illusion of Segmentation
    Feb 23 2026

    Welcome to a new episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons. It is Friday at 22:30, and a rail depot applies a minor network change to fix a flaky engineering link. By Monday morning, everything looks functional, but the security boundary has silently drifted. In this chapter, we break down why probabilistic defense and manual audits fundamentally fail in OT environments. We explore how to treat IEC 62443 zones and conduits as mathematical invariants, leveraging intent-based network verification to compute actual data plane behavior from configurations. Tune in to learn how to continuously attest your running state against a signed baseline and definitively prove your segmentation.

    Show More Show Less
    29 mins
  • Weekly Roundup: State Machine Breakdown & Engineering the Degraded Mode
    Feb 21 2026

    Welcome to a new weekly roundup episode of Cybersecurity Under Pressure. Real Attacks, Real Lessons. This week, we examine a cascade of high-impact events across multiple critical sectors: a massive DDoS wave knocking Deutsche Bahn’s passenger systems offline, ransomware forcing the University of Mississippi Medical Center to revert to manual workflows, a major data breach of France's FICOBA bank account registry, and a ransomware strike on the semiconductor supply chain at Advantest.

    While the attack vectors differ, the operational failure mode shares a common thread. In this chapter, we analyze an uncomfortable truth: when core services degrade, operators stop following verified workflows and invent new ones under pressure. We discuss how this human response fundamentally bypasses your defined state machine, introducing untestable variables like shared logins and undocumented remote access paths. Finally, we explore how to leverage IEC 62443 zones and conduits alongside NIS2 accountability mandates to engineer degraded modes exactly like safety functions. Tune in to learn how to design pre-approved fallbacks, time-bounded break-glass procedures, and resilient logging that survives when everything else is on fire.

    Show More Show Less
    41 mins
No reviews yet