Discover
The Cybersecurity Tapes
The Cybersecurity Tapes
Author: Dell Technologies
Subscribed: 39Played: 309Subscribe
Share
© Copyright Dell Technologies
Description
This first-of-its-kind audio drama from Dell explores what it takes to navigate the perilous and shifting terrain of the modern cybersecurity landscape, and how to best prepare yourself for what may be lurking around the next corner. Whether you're a tech professional or simply curious about the security of your personal data, these stories will help strengthen your defenses against a new kind of enemy. One you may not be expecting.
12 Episodes
Reverse
In this thrilling episode of The Cybersecurity Tapes, a state-of-the-art stadium faces a high-stakes cyberattack during a live event. As facial recognition systems falter and chaos looms, a dedicated team races to uncover the breach and restore order. With time running out, the team must act fast to prevent a technological disaster.
Flights vanish from the system, passengers are left stranded, and chaos erupts—all because a routine AI system update opened the door to a devastating airline cyberattack. In the latest episode, discover how one overlooked vulnerability sparked a digital meltdown that could impact anyone who depends on technology. Listen in for a firsthand look at how easy it is for essential systems to fail, and what you can do to help prevent it.
A billion-dollar movie premiere is days away when everything unravels—a single insider lets ransomware seize the final cut of Jack Smash Ten, turning an ordinary mistake into a box office catastrophe. “Box Office Bomb,” tThis episode exposes how even customers who put a lot of emphasis on cybersecurity can be blindsided by insider threats and simple lapses in digital security. Tune in to hear what really happened, why it could happen to anyone, and what steps you can take to avoid the same digital disaster.
An ambulance gets rerouted. A stable patient becomes critical. And no one — not dispatch, not the hospital, not the medics — knows why. Turns out, the problem wasn’t the traffic.It wasn’t the hospital. It was the AI. On the latest episode, a medical center rolls out a brand new generative AI system to streamline operations… and it backfires. Badly. Listen to the story of misrouted ambulances, boardroom politics, and a cybersecurity consultant who knows exactly where the cracks are.
A high-stakes product launch. A hacked teleprompter. A CEO blindsided in real-time. An expertly crafted digital heist turns a milestone event into a disaster. Hear the story unfold as wrong slides, glitched scripts, and chaos take the stage and how businesses can stay one step ahead of these increasingly sophisticated threats.
Part two of a two part series. Every business needs a partner and retail is no different. The question is, have you vetted your partners cybersecurity practices to ensure that when you do work with them, they don’t become the weakest link in the security of your business? In our latest episode, TechTown wants to advance their selling strategies by using geofencing to drive sales and promotions. It’s a great idea until we find out that these promotions are “2GOOD2B”. Dive in to find out what is going on with their partnership at technology provider Quintain
Part one of a two part series. Every business needs a partner and retail is no different. The question is, have you vetted your partners cybersecurity practices to ensure that when you do work with them, they don’t become the weakest link in the security of your business? In our latest episode, TechTown wants to advance their selling strategies by using geofencing to drive sales and promotions. It’s a great idea until we find out that these promotions are “2GOOD2B”. Dive in to find out what is going on with their partnership at technology provider Quintain.
Join us in this episode as we explore the journey of Silverwood Heights, a city on a journey through innovation to transition into a smart city, one that can service its people better. Discover the challenges and security issues they faced along the way, from rapid population growth to the unexpected vulnerabilities of their new smart infrastructure. Tune in to uncover the complexities and triumphs of their transformation.
In this episode we explore how mild mannered Frank, a barista by day, becomes a threat actor in his off time attacking Olympic Publishing where he has a grudge.
When a state-of-the-art chatbot unexpectedly exposes confidential corporate data, Maria is thrust into action, determined to uncover the underlying cause of this breach. This is the story from inside a hack: the twists and turns, the strategies that worked, and the lessons learned as Maria and her team strive to unraveling the layers of this mysterious incident and safeguard their client’s sensitive information.
An unsuspicious email from IT. A friendly text with a signature misspelling. All looked normal, but they were a hacker’s way in. This is the story from inside a hack: The breach and the aftermath. How it happened, what worked, and what didn’t.
An unsuspicious email from IT. A friendly text with a signature misspelling. All looked normal, but they were a hacker’s way in. This is the story from inside a hack: The breach and the aftermath. How it happened, what worked, and what didn’t.














