1. EachPod

Security Breach - Podcast

Security Breach

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Business News Tech News News Technology
Update frequency
every 7 days
Average duration
32 minutes
Episodes
140
Years Active
2022 - 2025
Share to:
Tech Debt and the Unsexy Side of Cybersecurity

Tech Debt and the Unsexy Side of Cybersecurity

How the legacy of OT innovation contributes to cyber challenges.

Vulnerabilities across the cybersecurity landscape are obviously trending in an upward direction. Perhaps most concerning, however, is …

00:40:45  |   Wed 31 Jan 2024
What Happens When a Torque Wrench Gets Hacked

What Happens When a Torque Wrench Gets Hacked

Two recent vulnerabilities, one traditional and one frighteningly unique, could reshape industrial cybersecurity.

In this episode, we’re going to dive into two recently detected vulnerabilities that c…

00:28:45  |   Thu 25 Jan 2024
AI, ChatGPT Fueling Surge in Ransomware

AI, ChatGPT Fueling Surge in Ransomware

Elevated social engineering, more connections and growing extortion amounts will drive attack growth.

Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident…

00:22:13  |   Tue 09 Jan 2024
New Strategies for Old-School Hacks

New Strategies for Old-School Hacks

Coordinating patches, covering the basics and not falling for 'pinky promises.'

Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One o…

00:28:24  |   Tue 09 Jan 2024
Learning from the Dark Side

Learning from the Dark Side

A former black hat offers insight on defending against hackers that "go for the throat every time."

One of the mindsets shared by hackers and their corporate victims is the desire to put a successful …

00:41:16  |   Wed 20 Dec 2023
The Growing Impact of Hacktivists and State-Sponsored Groups

The Growing Impact of Hacktivists and State-Sponsored Groups

Accidental advancements by state-sponsored hackers are impacting ICS security, and elevating network visibility needs.

Amongst the traditional threats to manufacturing enterprises and industrial contr…

00:42:11  |   Wed 13 Dec 2023
Vulnerability Data from 'The Wild'

Vulnerability Data from 'The Wild'

MITRE’s ATT&CK knowledgebase, and the intrusion patterns, hacker tactics and response data it provides.

While there are a number of indicators showing the positive direction in which industrial cybers…

00:41:06  |   Thu 07 Dec 2023
Walking the Line

Walking the Line

Balancing resources to keep the bad guys out, improve real-time visibility, and develop quicker responses to new attacks.

In what might be legendary singer Johnny Cash's most famous song, he speaks of…

00:29:44  |   Fri 01 Dec 2023
Breaking Down the Boeing Hack

Breaking Down the Boeing Hack

Industry experts assess the ransomware attack, the attacker, and critical takeaways for manufacturers of all sizes.

Recently, one of the most high-profile manufacturers in the world – Boeing – suffere…

00:26:08  |   Tue 21 Nov 2023
Turning Up the Cat & Mouse Game

Turning Up the Cat & Mouse Game

Staying ahead of hackers as they look to infiltrate every new connection point.

The balancing act continues when it comes to industrial cybersecurity, with the focus of many organizations split betwee…

00:25:42  |   Thu 16 Nov 2023
This is the Way ... to Beat Hackers

This is the Way ... to Beat Hackers

There are two common elements of a hacker’s strategy that show up regardless of whether it’s a ransomware attack on a local healthcare system or a malware drop on a global automotive manufacturer. 

Th…

00:39:00  |   Fri 10 Nov 2023
Criminal Organizations Know You

Criminal Organizations Know You

Using hacker tactics against them by getting IT and OT on the same page.

One of the most recent, widespread and hardest hitting cyberattacks is the MOVEit exploit spearheaded by the ransomware gang Cl…

00:39:49  |   Thu 02 Nov 2023
Patches, PLCs and Making it Harder for Hackers

Patches, PLCs and Making it Harder for Hackers

The little things that can shore up cyber defenses and protect against evolving attack groups.

When it comes to assessing the threat landscape for OT cybersecurity environments, the challenge has beco…

00:35:54  |   Thu 26 Oct 2023
Why AI is Your Biggest Threat and Most Powerful Ally

Why AI is Your Biggest Threat and Most Powerful Ally

Artificial intelligence is an unrivaled cyber threat, but benefits are also emerging for the White Hats.

We’ve talked about a lot of challenges, vulnerabilities, attacks and hacker groups on Security …

00:28:58  |   Thu 19 Oct 2023
The Ransomware Roller Coaster

The Ransomware Roller Coaster

How a dip in reported ransomware attacks could be disguising a push to target smaller manufacturers.

Today’s episode offers some new takes on a familiar topic – the rollercoaster-like dynamics of rans…

00:25:11  |   Wed 11 Oct 2023
'There's A Train Wreck Coming'

'There's A Train Wreck Coming'

Quantum Computing is not a future need - how it impacts (positively and negatively) everything you want to keep secure.

Instead of setting things up with data about recent attacks or stats from indust…

00:35:48  |   Wed 04 Oct 2023
'They're Hitting Everyone They Can'

'They're Hitting Everyone They Can'

How and why hackers are targeting smaller enterprises, and one organization's efforts to defend manufacturing.

We all know that cyberattacks in the industrial sector continue to rise and create new pr…

00:37:18  |   Fri 29 Sep 2023
How Hackers are Targeting Vehicles and Fleets

How Hackers are Targeting Vehicles and Fleets

EV charging stations, telematics and infotainment offer tremendous benefits, and security vulnerabilities.

Typically, when we talk about the expanding attack surface being created by new, exciting and…

00:41:31  |   Wed 20 Sep 2023
Doubling Down to Beat the Hackers

Doubling Down to Beat the Hackers

How the Industry IoT Consortium's new security framework offers a 'belt and suspenders' approach to cybersecurity.

One cybersecurity topic that gets me up on the soapbox quicker than most is the need …

00:33:16  |   Thu 14 Sep 2023
Inside the Summer's Biggest Industrial Hacks

Inside the Summer's Biggest Industrial Hacks

Takeaways from two unique, yet similarly damaging attacks.

This episode takes a slightly different approach. Instead of a single leading voice discussing trends and strategies focused on addressing an…

00:37:09  |   Thu 07 Sep 2023
Disclaimer: The podcast and artwork embedded on this page are the property of Eric Sorensen. This content is not affiliated with or endorsed by eachpod.com.