1. EachPod

Security Breach - Podcast

Security Breach

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Business News Tech News News Technology
Update frequency
every 7 days
Average duration
32 minutes
Episodes
140
Years Active
2022 - 2025
Share to:
Threat Landscape Update

Threat Landscape Update

Discussing the ever-expanding threat landscape is something we do a lot on Security Breach, but this episode is dedicated exclusively to topics like zero-day vulnerabilities, nation-state threats, ph…

00:49:32  |   Fri 05 Sep 2025
Cure Me or Kill Me - The Little Things That Escalate Attacks

Cure Me or Kill Me - The Little Things That Escalate Attacks

As loyal listeners of this podcast know, I’m a big believer in paying close attention to the little things, the blocking and tackling, the basics, the fundamentals. All those elementary elements that…

00:43:18  |   Thu 21 Aug 2025
Being 'Proactively Paranoid, Not Paralyzed'

Being 'Proactively Paranoid, Not Paralyzed'

As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different co…

00:36:54  |   Fri 08 Aug 2025
Why More Hackers Are Logging On Than Breaking In

Why More Hackers Are Logging On Than Breaking In

We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks.

Additionally, honing in on the human element of cyberse…

00:32:27  |   Fri 25 Jul 2025
You Think You Know Me

You Think You Know Me

Who are you?

This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. 

My conversation with Brandon Traffanstedt, Sr. Director and Global …

00:35:06  |   Wed 02 Jul 2025
Avoiding the Ostrich Approach

Avoiding the Ostrich Approach

I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So…

00:50:46  |   Fri 20 Jun 2025
'We've Made Our Own Prison'

'We've Made Our Own Prison'

Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge.

Regardless of the situation or dynamic, everyone likes to think that they’re special. However, wi…

00:42:19  |   Mon 02 Jun 2025
Dark AI Speeding Hacker Evolution

Dark AI Speeding Hacker Evolution

In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, f…

00:36:11  |   Fri 16 May 2025
Why Ransomware, Credential Theft and Phishing Schemes Persist

Why Ransomware, Credential Theft and Phishing Schemes Persist

One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new to…

00:39:22  |   Fri 25 Apr 2025
Unsecure Webcam Was All a Ransomware Group Needed

Unsecure Webcam Was All a Ransomware Group Needed

Endpoint security tools worked, but the hackers worked harder for their payday.

While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import ele…

00:31:23  |   Wed 16 Apr 2025
IABs, Dark Web Fueling Ransomware Surge

IABs, Dark Web Fueling Ransomware Surge

We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the blac…

00:38:41  |   Mon 31 Mar 2025
Manufacturing’s Internal Cyber Struggles

Manufacturing’s Internal Cyber Struggles

Breaking down silos while securing the cloud and leveraging secure-by-design advancements.

The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex an…

00:27:18  |   Thu 13 Mar 2025
Observations of an Ethical Hacking Researcher

Observations of an Ethical Hacking Researcher

One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel …

00:35:35  |   Fri 28 Feb 2025
The Evolution of OT Vulnerabilities

The Evolution of OT Vulnerabilities

When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding…

00:36:47  |   Thu 13 Feb 2025
The Legacy of AI in Cybersecurity

The Legacy of AI in Cybersecurity

While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social t…

00:26:46  |   Thu 30 Jan 2025
A Happy Ending to the Latest ICS Hack

A Happy Ending to the Latest ICS Hack

The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.

We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear…

00:29:25  |   Thu 16 Jan 2025
The Biggest Hacks of 2024

The Biggest Hacks of 2024

Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” 

His concerns about applying lessons learned to post WWII foreign policy initiatives rings just …

00:40:01  |   Fri 27 Dec 2024
Looking Back to Move Forward

Looking Back to Move Forward

As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months.

While I’m grateful for everyone we’ve had on the …

00:41:29  |   Thu 12 Dec 2024
AI Is Exposing Your Most Vulnerable Attack Surface

AI Is Exposing Your Most Vulnerable Attack Surface

According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– …

00:35:18  |   Mon 09 Dec 2024
Minimizing Hacks by Focusing on Uptime

Minimizing Hacks by Focusing on Uptime

Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll …

00:38:35  |   Thu 21 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of Eric Sorensen. This content is not affiliated with or endorsed by eachpod.com.