<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:rawvoice="https://blubrry.com/developer/rawvoice-rss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>The Security Ledger Podcast</title>
	<atom:link href="https://securityledger.com/category/podcasts/feed/" rel="self" type="application/rss+xml"/>
	<link>https://securityledger.com/category/podcasts/</link>
	<description>Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.</description>
	<lastBuildDate>Sat, 07 Mar 2026 03:24:25 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://securityledger.com/wp-content/uploads/2022/09/cropped-SecurityLedgerLogo-square-32x32.png</url>
	<title>The Security Ledger Podcast</title>
	<link>https://securityledger.com/category/podcasts/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<atom:link href="https://pubsubhubbub.appspot.com/" rel="hub"/>
	<itunes:author>Paul F. Roberts</itunes:author>
	<itunes:explicit>no</itunes:explicit>
	<itunes:image href="http://securityledger.com/wp-content/uploads/2013/04/Logo-144x144.jpg"/>
	<itunes:type>episodic</itunes:type>
	
	<copyright>© Copyright 2013 — The Security Ledger. All Rights Reserved</copyright>
	<podcast:license>All rights reserved</podcast:license>
	<podcast:medium>podcast</podcast:medium>
	
	
	
	<podcast:podping usesPodping="true"/>
	<podcast:guid>e6eb776e-c3f1-5a9e-8589-cb76a3c6fb41</podcast:guid>
	<rawvoice:subscribe feed="https://securityledger.com/category/podcasts/feed/" itunes="https://itunes.apple.com/us/podcast/the-security-ledger-podcasts/id680045866" spotify="https://open.spotify.com/show/5YZ0iBx5uwjbqRWeR7bHcQ?si=11b7444dbd91428b" tunein="https://tunein.com/podcasts/Technology-Podcasts/The-Security-Ledger-Podcasts-p1031325/"/>
<site xmlns="com-wordpress:feed-additions:1">39499104</site>	<itunes:keywords>cyber,security,Internet,security,hacking,malware,viruses,protection</itunes:keywords><itunes:summary>News and analysis of cyber threats and cyber security, as well as interviews with leading security experts. Hosted by Paul Roberts, Editor of The Security Ledger.</itunes:summary><itunes:subtitle>Cybersecurity News For The Internet Of Things</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Technology"><itunes:category text="Podcasting"/></itunes:category><itunes:category text="Technology"/><itunes:owner><itunes:email>paul@securityledger.com</itunes:email><itunes:name>Paul F. Roberts</itunes:name></itunes:owner><item>
		<title>When Cybersecurity Breaks Mobility: The Hidden Risks of Software-Powered Wheelchairs</title>
		<link>https://securityledger.com/2026/02/when-cybersecurity-breaks-mobility-the-hidden-risks-of-software-powered-wheelchairs/</link>
					<comments>https://securityledger.com/2026/02/when-cybersecurity-breaks-mobility-the-hidden-risks-of-software-powered-wheelchairs/#respond</comments>
		
		
		<pubDate>Mon, 02 Feb 2026 16:34:55 +0000</pubDate>
				<category><![CDATA[biomedical devices]]></category>
		<category><![CDATA[Bluetooth]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[power wheelchair]]></category>
		<category><![CDATA[QED Secure Solutions]]></category>
		<category><![CDATA[Spotlight Podcasts]]></category>
		<category><![CDATA[Technologies]]></category>
		<category><![CDATA[WHILL]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[medical device]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[wheelchair]]></category>
		<guid isPermaLink="false">https://securityledger.com/?p=478581</guid>

					<description><![CDATA[<p>Can a remote software attack send a power wheelchair tumbling down a staircase? Sadly: the answer is “yes.” Check out our latest podcast interview with Billy Rios and Brandon Rothel of QED Secure Solutions. Billy and Brandon discuss their research into security flaws in power wheelchairs by the Japanese firm WHILL. </p>
<p>The post <a href="https://securityledger.com/2026/02/when-cybersecurity-breaks-mobility-the-hidden-risks-of-software-powered-wheelchairs/">When Cybersecurity Breaks Mobility: The Hidden Risks of Software-Powered Wheelchairs</a> appeared first on <a href="https://securityledger.com">The Security Ledger with Paul F. Roberts</a>.</p>
]]></description>
		
					<wfw:commentRss>https://securityledger.com/2026/02/when-cybersecurity-breaks-mobility-the-hidden-risks-of-software-powered-wheelchairs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
				<enclosure length="41660603" type="audio/mpeg" url="https://media.blubrry.com/the_security_ledger_podcasts/content.blubrry.com/the_security_ledger_podcasts/Episode_264_QED_Secure-Wheelchair_Cyber.mp3"/>

				<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>43:24</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">478581</post-id>	<dc:creator>paul@securityledger.com (Paul F. Roberts)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Can a remote software attack send a power wheelchair tumbling down a staircase? Sadly: the answer is “yes.” Check out our latest podcast interview with Billy Rios and Brandon Rothel of QED Secure Solutions. Billy and Brandon discuss their research into security flaws in power wheelchairs by the Japanese firm WHILL. The post When Cybersecurity Breaks Mobility: The Hidden Risks of Software-Powered Wheelchairs appeared first on The Security Ledger with Paul F. Roberts.</itunes:subtitle><itunes:author>Paul F. Roberts</itunes:author><itunes:summary>Can a remote software attack send a power wheelchair tumbling down a staircase? Sadly: the answer is “yes.” Check out our latest podcast interview with Billy Rios and Brandon Rothel of QED Secure Solutions. Billy and Brandon discuss their research into security flaws in power wheelchairs by the Japanese firm WHILL. The post When Cybersecurity Breaks Mobility: The Hidden Risks of Software-Powered Wheelchairs appeared first on The Security Ledger with Paul F. Roberts.</itunes:summary><itunes:keywords>cyber,security,Internet,security,hacking,malware,viruses,protection</itunes:keywords></item>
		<item>
		<title>AI Surveillance: Unmasking Flock Safety’s Insecurities</title>
		<link>https://securityledger.com/2025/12/ai-surveillance-unmasking-flock-safetys-insecurities/</link>
		
		
		<pubDate>Mon, 29 Dec 2025 14:56:12 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Android Things]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cameras]]></category>
		<category><![CDATA[Consumer]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Flock Safety]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IP camera]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Spotlight Podcasts]]></category>
		<category><![CDATA[Technologies]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[reports]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[trends]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://securityledger.com/?p=478519</guid>

					<description><![CDATA[<p>Security researcher Jon “Gainsec” Gaines and YouTuber Benn Jordan discuss their examination of Flock Safety’s AI-powered license plate readers and how cost-driven design choices, outdated software, and weak security controls expose them to abuse.</p>
<p>The post <a href="https://securityledger.com/2025/12/ai-surveillance-unmasking-flock-safetys-insecurities/">AI Surveillance: Unmasking Flock Safety&#8217;s Insecurities</a> appeared first on <a href="https://securityledger.com">The Security Ledger with Paul F. Roberts</a>.</p>
]]></description>
		
		
				<enclosure length="49277909" type="audio/mpeg" url="https://media.blubrry.com/the_security_ledger_podcasts/content.blubrry.com/the_security_ledger_podcasts/Flock_Surveillance_Insecurity.mp3"/>

				<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>51:20</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">478519</post-id>	<dc:creator>paul@securityledger.com (Paul F. Roberts)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Security researcher Jon “Gainsec” Gaines and YouTuber Benn Jordan discuss their examination of Flock Safety’s AI-powered license plate readers and how cost-driven design choices, outdated software, and weak security controls expose them to abuse. The post AI Surveillance: Unmasking Flock Safety&amp;#8217;s Insecurities appeared first on The Security Ledger with Paul F. Roberts.</itunes:subtitle><itunes:author>Paul F. Roberts</itunes:author><itunes:summary>Security researcher Jon “Gainsec” Gaines and YouTuber Benn Jordan discuss their examination of Flock Safety’s AI-powered license plate readers and how cost-driven design choices, outdated software, and weak security controls expose them to abuse. The post AI Surveillance: Unmasking Flock Safety&amp;#8217;s Insecurities appeared first on The Security Ledger with Paul F. Roberts.</itunes:summary><itunes:keywords>cyber,security,Internet,security,hacking,malware,viruses,protection</itunes:keywords></item>
		<item>
		<title>Cyber Threats to Water Infrastructure: Insights from Josh Corman</title>
		<link>https://securityledger.com/2025/11/cyber-threats-to-water-infrastructure-insights-from-josh-corman/</link>
		
		
		<pubDate>Wed, 26 Nov 2025 10:57:00 +0000</pubDate>
				<category><![CDATA[APT]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Companies]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[Dragos Security]]></category>
		<category><![CDATA[IAmtheCavalry]]></category>
		<category><![CDATA[Institute for Security and Technology]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Spotlight Podcasts]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Volt Typhoon]]></category>
		<category><![CDATA[water]]></category>
		<category><![CDATA[data analytics]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[IAmTheCavalry]]></category>
		<category><![CDATA[Littleton]]></category>
		<category><![CDATA[Massachusetts]]></category>
		<category><![CDATA[operational technology]]></category>
		<category><![CDATA[trends]]></category>
		<category><![CDATA[water infrastructure]]></category>
		<guid isPermaLink="false">https://securityledger.com/?p=478441</guid>

					<description><![CDATA[<p>Cyber attacks on water infrastructure are growing. Josh Corman of IAmTheCavalry joins us to discuss efforts to secure critical water systems.</p>
<p>The post <a href="https://securityledger.com/2025/11/cyber-threats-to-water-infrastructure-insights-from-josh-corman/">Cyber Threats to Water Infrastructure: Insights from Josh Corman</a> appeared first on <a href="https://securityledger.com">The Security Ledger with Paul F. Roberts</a>.</p>
]]></description>
		
		
				<enclosure length="43009380" type="audio/mpeg" url="https://media.blubrry.com/the_security_ledger_podcasts/content.blubrry.com/the_security_ledger_podcasts/Security_Ledger_Podcast_Episode_262_Joshua_Corman_on.mp3"/>

				<itunes:episode>262</itunes:episode>
		<podcast:episode display="262">262</podcast:episode>
		<itunes:title>Josh Corman on Cyber Risks To Water Infrastructure</itunes:title>
		<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>44:48</itunes:duration>
		<podcast:transcript language="en-US" rel="captions" type="text/plain" url="https://securityledger.com/wp-content/uploads/2025/11/Security-Ledger-Podcast-Episode-262-Joshua-Corman-on.txt"/>
<post-id xmlns="com-wordpress:feed-additions:1">478441</post-id>	<dc:creator>paul@securityledger.com (Paul F. Roberts)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Cyber attacks on water infrastructure are growing. Josh Corman of IAmTheCavalry joins us to discuss efforts to secure critical water systems. The post Cyber Threats to Water Infrastructure: Insights from Josh Corman appeared first on The Security Ledger with Paul F. Roberts.</itunes:subtitle><itunes:author>Paul F. Roberts</itunes:author><itunes:summary>Cyber attacks on water infrastructure are growing. Josh Corman of IAmTheCavalry joins us to discuss efforts to secure critical water systems. The post Cyber Threats to Water Infrastructure: Insights from Josh Corman appeared first on The Security Ledger with Paul F. Roberts.</itunes:summary><itunes:keywords>cyber,security,Internet,security,hacking,malware,viruses,protection</itunes:keywords></item>
		<item>
		<title>How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty’s Noam Moshe</title>
		<link>https://securityledger.com/2025/09/how-hackers-take-over-security-cameras-and-what-you-can-do-about-it-a-conversation-with-clarotys-noam-moshe/</link>
		
		
		<pubDate>Wed, 03 Sep 2025 10:05:00 +0000</pubDate>
				<category><![CDATA[Axis IP Camera]]></category>
		<category><![CDATA[Black Hat]]></category>
		<category><![CDATA[cameras]]></category>
		<category><![CDATA[Claroty]]></category>
		<category><![CDATA[Companies]]></category>
		<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Hacks & Hackers]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[published research]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Spotlight Podcasts]]></category>
		<category><![CDATA[Black Hat Briefings]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[embedded device]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[reports]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://securityledger.com/?p=478239</guid>

					<description><![CDATA[<p>Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at  this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT threats.</p>
<p>The post <a href="https://securityledger.com/2025/09/how-hackers-take-over-security-cameras-and-what-you-can-do-about-it-a-conversation-with-clarotys-noam-moshe/">How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty&#8217;s Noam Moshe</a> appeared first on <a href="https://securityledger.com">The Security Ledger with Paul F. Roberts</a>.</p>
]]></description>
		
		
				<enclosure length="25565826" type="audio/mpeg" url="https://media.blubrry.com/the_security_ledger_podcasts/media.blubrry.com/the_security_ledger_podcasts/content.blubrry.com/the_security_ledger_podcasts/SL_Podcast_Noam_Claroty_AxisCameras.mp3"/>

				<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>26:38</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">478239</post-id>	<dc:creator>paul@securityledger.com (Paul F. Roberts)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT threats. The post How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty&amp;#8217;s Noam Moshe appeared first on The Security Ledger with Paul F. Roberts.</itunes:subtitle><itunes:author>Paul F. Roberts</itunes:author><itunes:summary>Cybersecurity researcher Noam Moshe of Claroty met up with The Security Ledger Podcast at this year's Black Hat Briefings to discuss his presentation on critical Axis IP camera vulnerabilities that could let hackers spy, manipulate video feeds, and pivot into sensitive networks—and what organizations can do to defend against these (and other) IoT threats. The post How Hackers Take Over Security Cameras (and What You Can Do About It): A Conversation With Claroty&amp;#8217;s Noam Moshe appeared first on The Security Ledger with Paul F. Roberts.</itunes:summary><itunes:keywords>cyber,security,Internet,security,hacking,malware,viruses,protection</itunes:keywords></item>
		<item>
		<title>Episode 260:  The Art of Teaching Secure Coding with Tanya Janca</title>
		<link>https://securityledger.com/2025/02/episode-260-the-art-of-teaching-secure-coding-with-tanya-janca/</link>
		
		
		<pubDate>Tue, 18 Feb 2025 11:00:00 +0000</pubDate>
				<category><![CDATA[application]]></category>
		<category><![CDATA[application development]]></category>
		<category><![CDATA[application security]]></category>
		<category><![CDATA[book review]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[Spotlight Podcasts]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[web applications]]></category>
		<category><![CDATA[interview]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[She Hacks Purple]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://securityledger.com/?p=477935</guid>

					<description><![CDATA[<p>In this episode of the podcast, host Paul Roberts welcomes Tanya Janca of She Hacks Purple back into the studio. Tanya talks about her newly released book: Alice and Bob Learn Secure Coding, published by Wiley and the larger problem of how to promote the teaching of secure coding practices to developers.</p>
<p>The post <a href="https://securityledger.com/2025/02/episode-260-the-art-of-teaching-secure-coding-with-tanya-janca/">Episode 260:  The Art of Teaching Secure Coding with Tanya Janca</a> appeared first on <a href="https://securityledger.com">The Security Ledger with Paul F. Roberts</a>.</p>
]]></description>
		
		
				<enclosure length="35072770" type="audio/mpeg" url="https://media.blubrry.com/the_security_ledger_podcasts/content.blubrry.com/the_security_ledger_podcasts/Episode260_Tanya_Janca_Alice_Bob.mp3"/>

				<itunes:episodeType>full</itunes:episodeType>
		<itunes:duration>36:32</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">477935</post-id>	<dc:creator>paul@securityledger.com (Paul F. Roberts)</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>In this episode of the podcast, host Paul Roberts welcomes Tanya Janca of She Hacks Purple back into the studio. Tanya talks about her newly released book: Alice and Bob Learn Secure Coding, published by Wiley and the larger problem of how to promote the teaching of secure coding practices to developers. The post Episode 260: The Art of Teaching Secure Coding with Tanya Janca appeared first on The Security Ledger with Paul F. Roberts.</itunes:subtitle><itunes:author>Paul F. Roberts</itunes:author><itunes:summary>In this episode of the podcast, host Paul Roberts welcomes Tanya Janca of She Hacks Purple back into the studio. Tanya talks about her newly released book: Alice and Bob Learn Secure Coding, published by Wiley and the larger problem of how to promote the teaching of secure coding practices to developers. The post Episode 260: The Art of Teaching Secure Coding with Tanya Janca appeared first on The Security Ledger with Paul F. Roberts.</itunes:summary><itunes:keywords>cyber,security,Internet,security,hacking,malware,viruses,protection</itunes:keywords></item>
	</channel>
</rss>