A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
Over the last nearly 100 episodes of Security Breach we’ve discussed a wide range of strategies for protecting the manufacturing enterprise. But perhaps the most polarizing of these has been Zero Tru…
One of the more common obstacles that we discuss here on Security Breach is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In t…
Those of you with a military or law enforcement connection are probably, and unfortunately, familiar with the term collateral damage. While this phrase has a legacy in these environments, it’s also b…
Viewing hacks as diseases to address evolving threats, vulnerabilities and tools like AI.
Like many of you, I recently dove into Verizon’s 2024 Data Breach Investigations Report (DBIR). And while the…
It starts with a dedication to enhanced visibility.
One of the big conversations regarding OT security revolves around the use of tools. Some have too many, others not enough and everyone is searching…
Many attacks on manufacturers are just the first step in going after even bigger targets.
One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground fo…
In this episode, we dive into some of the most notorious attacks to hit manufacturing over the last six months.
In addition to speaking with cybersecurity experts from around the world for this podcas…
A look back at Security Breach guest's most accurate and timely industrial cybersecurity predictions.
As we near our 100th episode of Security Beach, I thought it would be a good time to take a look b…
The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies.
The origins of what we talk about here on Security Breach can go back to any number of transformationa…
How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield.
Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactic…
The good, the bad and the ugly of mobile device security in the expanding OT attack landscape.
Included in the challenges associated with securing an ever-expanding OT attack surface is the role playe…
It's not always about the ransom, data theft or denial of service.
Many cheered with the recent crackdowns on groups like LockBit, and rightfully so. However, the harsh reality is that most of these …
How we're failing to properly support and train our most important cybersecurity asset.
According to Nozomi Networks February 2024 OT-IoT Security Report, manufacturing was exposed to more common vuln…
Threat intelligence is important, but why manufacturers should focus on risk factors first.
When it comes to the industrial sector’s ongoing cybersecurity challenges, we all know that there's more to …
The sector's (forced) cyber awakening needs to focus on making it harder to be a hacker.
Regardless of how complex the attack, how organized the hacker, or how advanced the tools and tactics, security…
How thinking like a hacker can lead to better cybersecurity ROI and avoid the dreaded "hope" strategy.
Regardless of what you might hear from some, ransomware in the industrial sector is at an all-tim…
Creating an OT vision, and why hackers are "like water."
With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of th…
Hacker insight and vulnerability updates are great, but that's only half the battle.
An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of ne…
The tech that's helping social engineers expand current exploits, including credential harvesting.
In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber r…
How prioritizing the wrong data and assets is leading to more cyber risk.
When it comes to OT security, the cruel reality is that the bad guys are doing what most predators do over time – they continu…