A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
How the legacy of OT innovation contributes to cyber challenges.
Vulnerabilities across the cybersecurity landscape are obviously trending in an upward direction. Perhaps most concerning, however, is …
Two recent vulnerabilities, one traditional and one frighteningly unique, could reshape industrial cybersecurity.
In this episode, we’re going to dive into two recently detected vulnerabilities that c…
Elevated social engineering, more connections and growing extortion amounts will drive attack growth.
Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident…
Coordinating patches, covering the basics and not falling for 'pinky promises.'
Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One o…
A former black hat offers insight on defending against hackers that "go for the throat every time."
One of the mindsets shared by hackers and their corporate victims is the desire to put a successful …
Accidental advancements by state-sponsored hackers are impacting ICS security, and elevating network visibility needs.
Amongst the traditional threats to manufacturing enterprises and industrial contr…
MITRE’s ATT&CK knowledgebase, and the intrusion patterns, hacker tactics and response data it provides.
While there are a number of indicators showing the positive direction in which industrial cybers…
Balancing resources to keep the bad guys out, improve real-time visibility, and develop quicker responses to new attacks.
In what might be legendary singer Johnny Cash's most famous song, he speaks of…
Industry experts assess the ransomware attack, the attacker, and critical takeaways for manufacturers of all sizes.
Recently, one of the most high-profile manufacturers in the world – Boeing – suffere…
Staying ahead of hackers as they look to infiltrate every new connection point.
The balancing act continues when it comes to industrial cybersecurity, with the focus of many organizations split betwee…
There are two common elements of a hacker’s strategy that show up regardless of whether it’s a ransomware attack on a local healthcare system or a malware drop on a global automotive manufacturer.
Th…
Using hacker tactics against them by getting IT and OT on the same page.
One of the most recent, widespread and hardest hitting cyberattacks is the MOVEit exploit spearheaded by the ransomware gang Cl…
The little things that can shore up cyber defenses and protect against evolving attack groups.
When it comes to assessing the threat landscape for OT cybersecurity environments, the challenge has beco…
Artificial intelligence is an unrivaled cyber threat, but benefits are also emerging for the White Hats.
We’ve talked about a lot of challenges, vulnerabilities, attacks and hacker groups on Security …
How a dip in reported ransomware attacks could be disguising a push to target smaller manufacturers.
Today’s episode offers some new takes on a familiar topic – the rollercoaster-like dynamics of rans…
Quantum Computing is not a future need - how it impacts (positively and negatively) everything you want to keep secure.
Instead of setting things up with data about recent attacks or stats from indust…
How and why hackers are targeting smaller enterprises, and one organization's efforts to defend manufacturing.
We all know that cyberattacks in the industrial sector continue to rise and create new pr…
EV charging stations, telematics and infotainment offer tremendous benefits, and security vulnerabilities.
Typically, when we talk about the expanding attack surface being created by new, exciting and…
How the Industry IoT Consortium's new security framework offers a 'belt and suspenders' approach to cybersecurity.
One cybersecurity topic that gets me up on the soapbox quicker than most is the need …
Takeaways from two unique, yet similarly damaging attacks.
This episode takes a slightly different approach. Instead of a single leading voice discussing trends and strategies focused on addressing an…