1. EachPod

Security Breach - Podcast

Security Breach

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Business News Tech News News Technology
Update frequency
every 7 days
Average duration
32 minutes
Episodes
140
Years Active
2022 - 2025
Share to:
The Protection and Productivity of Zero Trust

The Protection and Productivity of Zero Trust

Over the last nearly 100 episodes of Security Breach we’ve discussed a wide range of strategies for protecting the manufacturing enterprise. But perhaps the most polarizing of these has been Zero Tru…

00:43:09  |   Thu 20 Jun 2024
OT's Legacy Tech Challenges

OT's Legacy Tech Challenges

One of the more common obstacles that we discuss here on Security Breach is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In t…

00:28:14  |   Wed 12 Jun 2024
Shutting Down 'Spy Board' Threats

Shutting Down 'Spy Board' Threats

Those of you with a military or law enforcement connection are probably, and unfortunately, familiar with the term collateral damage. While this phrase has a legacy in these environments, it’s also b…

00:34:21  |   Wed 05 Jun 2024
The OT Threat Landscape's Infectious Nature

The OT Threat Landscape's Infectious Nature

Viewing hacks as diseases to address evolving threats, vulnerabilities and tools like AI.

Like many of you, I recently dove into Verizon’s 2024 Data Breach Investigations Report (DBIR).  And while the…

00:43:35  |   Thu 30 May 2024
Knowing How to Arm Yourself for Battle

Knowing How to Arm Yourself for Battle

It starts with a dedication to enhanced visibility.

One of the big conversations regarding OT security revolves around the use of tools. Some have too many, others not enough and everyone is searching…

00:36:41  |   Mon 20 May 2024
Supply Chains Are a Hacker's Gateway

Supply Chains Are a Hacker's Gateway

Many attacks on manufacturers are just the first step in going after even bigger targets.

One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground fo…

00:33:17  |   Thu 16 May 2024
The Hacks!

The Hacks!

In this episode, we dive into some of the most notorious attacks to hit manufacturing over the last six months.

In addition to speaking with cybersecurity experts from around the world for this podcas…

00:16:04  |   Wed 08 May 2024
Security Breach: Predictions That Landed

Security Breach: Predictions That Landed

A look back at Security Breach guest's most accurate and timely industrial cybersecurity predictions.

As we near our 100th episode of Security Beach, I thought it would be a good time to take a look b…

00:31:28  |   Wed 01 May 2024
DMZs, Alarm Floods and Prepping for 'What If?'

DMZs, Alarm Floods and Prepping for 'What If?'

The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies.

The origins of what we talk about here on Security Breach can go back to any number of transformationa…

00:47:50  |   Wed 24 Apr 2024
Weaponizing Secure-By-Design

Weaponizing Secure-By-Design

How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield.

Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactic…

00:42:25  |   Wed 17 Apr 2024
The Impacts of Over-Connectivity and Mobile Defeatism

The Impacts of Over-Connectivity and Mobile Defeatism

The good, the bad and the ugly of mobile device security in the expanding OT attack landscape.

Included in the challenges associated with securing an ever-expanding OT attack surface is the role playe…

00:48:44  |   Wed 10 Apr 2024
Hackers Learn How to Attack You, From You

Hackers Learn How to Attack You, From You

It's not always about the ransom, data theft or denial of service.

Many cheered with the recent crackdowns  on groups like LockBit, and rightfully so. However, the harsh reality is that most of these …

00:34:36  |   Wed 03 Apr 2024
The Largest Attack Surface - People

The Largest Attack Surface - People

How we're failing to properly support and train our most important cybersecurity asset.

According to Nozomi Networks February 2024 OT-IoT Security Report, manufacturing was exposed to more common vuln…

00:44:25  |   Thu 28 Mar 2024
Avoiding a 'Chicken Little' Cybersecurity Strategy

Avoiding a 'Chicken Little' Cybersecurity Strategy

Threat intelligence is important, but why manufacturers should focus on risk factors first.

When it comes to the industrial sector’s ongoing cybersecurity challenges, we all know that there's more to …

00:39:24  |   Thu 21 Mar 2024
Cybersecurity's Greatest Weapon - Awareness

Cybersecurity's Greatest Weapon - Awareness

The sector's (forced) cyber awakening needs to focus on making it harder to be a hacker.

Regardless of how complex the attack, how organized the hacker, or how advanced the tools and tactics, security…

00:36:56  |   Wed 13 Mar 2024
Chasing Cyber Ghosts

Chasing Cyber Ghosts

How thinking like a hacker can lead to better cybersecurity ROI and avoid the dreaded "hope" strategy.

Regardless of what you might hear from some, ransomware in the industrial sector is at an all-tim…

00:28:35  |   Wed 06 Mar 2024
Missteps Creating 'An Internal Collection of Hackers'

Missteps Creating 'An Internal Collection of Hackers'

Creating an OT vision, and why hackers are "like water."

With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of th…

00:40:01  |   Wed 28 Feb 2024
Leveraging Threat Intelligence Data

Leveraging Threat Intelligence Data

Hacker insight and vulnerability updates are great, but that's only half the battle.

An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of ne…

00:37:57  |   Thu 22 Feb 2024
The Hacker's Most Lucrative Attack

The Hacker's Most Lucrative Attack

The tech that's helping social engineers expand current exploits, including credential harvesting.

In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber r…

00:36:12  |   Thu 15 Feb 2024
SBOMs, AI and the Crown Jewels

SBOMs, AI and the Crown Jewels

How prioritizing the wrong data and assets is leading to more cyber risk.

When it comes to OT security, the cruel reality is that the bad guys are doing what most predators do over time – they continu…

00:33:17  |   Wed 07 Feb 2024
Disclaimer: The podcast and artwork embedded on this page are the property of Eric Sorensen. This content is not affiliated with or endorsed by eachpod.com.