1. EachPod

Security Breach - Podcast

Security Breach

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Business News Tech News News Technology
Update frequency
every 7 days
Average duration
32 minutes
Episodes
140
Years Active
2022 - 2025
Share to:
What Cybersecurity Can Learn from Tom Brady

What Cybersecurity Can Learn from Tom Brady

We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.

Today’s episode is going to take on a little different flavor, as we’re going to show you one partic…

00:52:41  |   Fri 15 Nov 2024
Threat Landscape Update

Threat Landscape Update

For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving…

00:38:16  |   Fri 08 Nov 2024
The Little Things That Kill

The Little Things That Kill

While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.

We know that the frequency of attacks will continue to increase.

We…

00:38:04  |   Thu 31 Oct 2024
Phishing Attack Defense 'Not Rocket Science'

Phishing Attack Defense 'Not Rocket Science'

Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ra…

00:22:22  |   Thu 24 Oct 2024
Legacy Mindsets Are Helping Hackers Weaponize Networks

Legacy Mindsets Are Helping Hackers Weaponize Networks

So, my daughters like to give me a hard time about growing old. 

Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines ar…

00:42:09  |   Fri 18 Oct 2024
Using Force Multipliers to Protect Against Next-Gen Stuxnet

Using Force Multipliers to Protect Against Next-Gen Stuxnet

While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controll…

00:39:43  |   Thu 10 Oct 2024
Never Let a Good Hack Go to Waste

Never Let a Good Hack Go to Waste

One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with…

00:32:59  |   Thu 03 Oct 2024
Finding Your 'Creative Maliciousness'

Finding Your 'Creative Maliciousness'

According to Veeam’s 2024 Ransomware Trends Report, cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number …

00:38:38  |   Thu 26 Sep 2024
Getting Past the Whack-A-Mole Approach

Getting Past the Whack-A-Mole Approach

The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and f…

00:35:31  |   Fri 20 Sep 2024
Inside the Growing Complexity of Ransomware Hacking Groups

Inside the Growing Complexity of Ransomware Hacking Groups

We’re back to discuss an all-too-familiar topic – ransomware.

Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutio…

00:32:02  |   Wed 11 Sep 2024
Time to 'Rip off the Band-Aid' to Ensure Security

Time to 'Rip off the Band-Aid' to Ensure Security

A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges.

In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motiva…

00:39:13  |   Thu 05 Sep 2024
Combating the 20th Century Mafia with a Stronger Human Firewall

Combating the 20th Century Mafia with a Stronger Human Firewall

Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have incre…

00:46:07  |   Wed 28 Aug 2024
Tearing Down the 'Set It and Forget It' Mindset

Tearing Down the 'Set It and Forget It' Mindset

I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-p…

00:41:54  |   Thu 22 Aug 2024
Bridging the IT-OT Divide

Bridging the IT-OT Divide

When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on vario…

00:20:30  |   Thu 15 Aug 2024
'There's No Bulletproof Vest' in Cybersecurity

'There's No Bulletproof Vest' in Cybersecurity

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.

When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to as…

00:51:29  |   Thu 08 Aug 2024
Are We Over-Connected?

Are We Over-Connected?

The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we con…

00:19:51  |   Fri 02 Aug 2024
The $25M 'Wake-Up Call' Supply Chain Hack

The $25M 'Wake-Up Call' Supply Chain Hack

According to IBM’s Cost of a Data Breach Report, nearly 20 percent of the organizations surveyed stated that they have experienced a breach stemming from a compromise in their supply chain, or a vuln…

00:30:42  |   Wed 24 Jul 2024
The Dollars and Sense of Cybersecurity

The Dollars and Sense of Cybersecurity

Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a repo…

00:40:27  |   Fri 19 Jul 2024
There's No 'Plant the Flag' Moment in Cybersecurity

There's No 'Plant the Flag' Moment in Cybersecurity

When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s r…

00:33:08  |   Thu 11 Jul 2024
'Nobody Should Get Ransomwared'

'Nobody Should Get Ransomwared'

As we’ve discussed numerous times on Security Breach, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space.

Whether …

00:38:05  |   Thu 27 Jun 2024
Disclaimer: The podcast and artwork embedded on this page are the property of Eric Sorensen. This content is not affiliated with or endorsed by eachpod.com.