1. EachPod

Security Breach - Podcast

Security Breach

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Business News Tech News News Technology
Update frequency
every 7 days
Average duration
32 minutes
Episodes
140
Years Active
2022 - 2025
Share to:
Avoiding 'Shiny New Objects'

Avoiding 'Shiny New Objects'

Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.

A recent report from OT cybersecurity solutions provider Cyolo discussed several factor…

00:34:41  |   Wed 30 Aug 2023
Knowing 'What is Good'

Knowing 'What is Good'

Using data to break down silos, reverse engineer outcomes, and identify emerging threats like WormGPT.

According to recent report from Trellix, 31 percent of CISOs identified a lack of buy-in and use …

00:38:15  |   Wed 23 Aug 2023
Security Breach: 'The Edge Always Goes to the Attacker'

Security Breach: 'The Edge Always Goes to the Attacker'

Embracing the 'not if, but when' mindset.

Cybersecurity solutions provider Trellix recently unveiled their 2023 Voice of the CISO report. Among other topics, it explored the top 5 challenges cited by …

00:49:35  |   Fri 18 Aug 2023
Phishing Lessons and 'Shifting the Target'

Phishing Lessons and 'Shifting the Target'

How a global manufacturer learned from past attacks, and the most critical benefit of security tools.

IBM research shows a 33 percent increase in cyberattacks against manufacturing companies between 2…

00:53:14  |   Thu 10 Aug 2023
The Growing Problem of 'Insecure by Design'

The Growing Problem of 'Insecure by Design'

"It just boggles the mind that things that are so important to how our world works are so shockingly unprotected."

According to ABI Research, less than five percent of critical industrial infrastructu…

00:41:30  |   Fri 04 Aug 2023
Cloud Apps are Elevating Malware Threats

Cloud Apps are Elevating Malware Threats

Netskope Threat Labs, a leading provider of threat analysis and cyber defense strategies for cloud-based vulnerabilities, recently published their most recent Threat Labs Report. Findings specific to…

00:35:19  |   Tue 25 Jul 2023
AI - Use It or Lose!

AI - Use It or Lose!

The latest tools and technology needed to create and defend your data fortress.

A couple of recent ransomware attacks offer perspective on evolving cybersecurity concerns within the industrial sector

G…

00:19:10  |   Thu 13 Jul 2023
The Best Way to Identify, Defeat Hackers

The Best Way to Identify, Defeat Hackers

Vital defensive tactics that go beyond the attacker.

The sensor and communication technology associated with remote monitoring has proven to be both a time-saving and productivity enhancing tool, as w…

00:42:34  |   Thu 29 Jun 2023
The Impressive and Terrifying Evolution of Ransomware Gangs

The Impressive and Terrifying Evolution of Ransomware Gangs

How hackers are targeting ERP systems and automating more attacks.

Adding to the data supporting a surge in cyber-criminal activity is the FBI Crime Compliant Center’s most recent Internet Crime Repor…

00:34:39  |   Wed 21 Jun 2023
Humans, 'Promiscuous Devices' Creating More Threats

Humans, 'Promiscuous Devices' Creating More Threats

How increasingly complex attacks might demand taking humans out of the cybersecurity loop.

First published in 2014, the National Institute of Standards and Technology (NIST) recently announced updates…

00:26:47  |   Tue 13 Jun 2023
Enemies at the Gate

Enemies at the Gate

Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks.

While more connection points can create more security soft spots for industrial enterprises, it…

00:39:24  |   Wed 07 Jun 2023
The Bad Guys Are Salivating Over Manufacturing

The Bad Guys Are Salivating Over Manufacturing

Inside the resurgence of ransomware attacks and the rise of billion-dollar "unicorn" hacker gangs.

Believe it or not, there was a time in recent history when we actually experienced a reprieve in rans…

00:43:18  |   Thu 01 Jun 2023
More than Security, Cyber Defense Is 'Life Safety'

More than Security, Cyber Defense Is 'Life Safety'

Strategies for breaking down IT silos in learning how people, devices and networks can be attacked.

Providing a significant assist to transparency efforts in cybersecurity is the Strengthening America…

00:35:18  |   Thu 25 May 2023
Making Hackers Pay (Literally)

Making Hackers Pay (Literally)

Why cybersecurity is all about ROI, and other "unsexy" stuff on which to build your defenses.

In previous episodes of Security Breach, we’ve discussed penetration testing, ethical hackers, cataloging …

00:49:18  |   Thu 18 May 2023
Hackers Want to Steal, Extort Competitive Advantages

Hackers Want to Steal, Extort Competitive Advantages

Supply chain management has always been a priority for the industrial sector, but over the last three-plus years, its importance has been elevated for numerous reasons. The problem, from a cybersecur…

00:35:27  |   Wed 10 May 2023
An Unlikely Assist from Ransomware and the Looming Threats of AI

An Unlikely Assist from Ransomware and the Looming Threats of AI

One of the biggest challenges surrounding industrial cybersecurity is the size of the attack surface that must be monitored, assessed, and constantly updated in order to evolve with the rising number…

00:36:26  |   Wed 03 May 2023
Trusting the Creative Hacker

Trusting the Creative Hacker

The industrial sector continues to be a hot target for hackers. Ransomware, malware and phishing attacks all continue to escalate in both frequency and potency. The on-going mixture of new technologi…

00:41:31  |   Mon 24 Apr 2023
The Cybercriminal's Favorite Pastime

The Cybercriminal's Favorite Pastime

Perhaps the only topic that solicits a uniform response is when my guests are asked about the most important part of a cybersecurity plan. The common mantra is that there has to be buy-in throughout …

00:34:53  |   Fri 07 Apr 2023
Balancing The Light and Dark Forces of Technology

Balancing The Light and Dark Forces of Technology

As we continue to see an increase in attacks targeting the ICS, it’s about more than just the industrial sector creating cyber defense plans, cataloging connection points and shoring up vulnerabiliti…

00:36:00  |   Thu 30 Mar 2023
Thinking Like the Bad Guy

Thinking Like the Bad Guy

The latest high-profile hack of Dole Foods reinforces the need to upgrade operational technology security, and not just for the manufacturer. The distributors, logistics providers, retailers and end-…

00:26:28  |   Thu 23 Mar 2023
Disclaimer: The podcast and artwork embedded on this page are the property of Eric Sorensen. This content is not affiliated with or endorsed by eachpod.com.