1. EachPod

Security Breach - Podcast

Security Breach

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Business News Tech News News Technology
Update frequency
every 7 days
Average duration
32 minutes
Episodes
140
Years Active
2022 - 2025
Share to:
Breaking Down the Dole Foods Ransomware Attack

Breaking Down the Dole Foods Ransomware Attack

Joining the ranks of high-profile ransomware attacks at Nissan, Colonial Pipeline, JBS Foods, Schneider Electric and even Foxconn, is Dole Foods.

The global food processor was the victim of a ransomwa…

00:28:33  |   Thu 16 Mar 2023
The Air Gap Lie and The Spectrum of Extortion

The Air Gap Lie and The Spectrum of Extortion

While the growth of ransomware, phishing schemes and other nefarious cyber activities are obviously not positive developments for the industrial sector, the resulting exposure and fallout from high p…

00:39:37  |   Wed 08 Mar 2023
Latest Ransomware Attacks Educate, then Humiliate

Latest Ransomware Attacks Educate, then Humiliate

One of the on-going topics that we cover here on Security Breach is ransomware attacks.

The risk of continually discussing a topic is that it can become like white noise – always present, but in the b…

00:27:03  |   Mon 27 Feb 2023
Hiding, Not Running from Hackers

Hiding, Not Running from Hackers

When it comes to securing the industrial enterprise, a great deal of focus is being paid to what might seem like the little things – such as passwords, logins or credentials that are used to limit ac…

00:29:21  |   Mon 20 Feb 2023
Hacker's Insight: 'How Can I Make Stuff Worse'

Hacker's Insight: 'How Can I Make Stuff Worse'

The potential of smarter factories driven by advanced technologies and greater connectivity is exciting … but equally daunting.

That’s because in our enthusiasm to embrace all the time and cost saving…

00:26:46  |   Mon 13 Feb 2023
When Seeing the Attack Isn't Enough to Stop It

When Seeing the Attack Isn't Enough to Stop It

We’re excited to announce that Security Breach is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to rockwellautomation.com

According to a rec…

00:25:46  |   Tue 07 Feb 2023
People Are Part of the Damage

People Are Part of the Damage

I usually start each episode by listing off a number of escalating and intentionally frightening statistics about the rising number of cybersecurity threats facing the industrial sector. The goal is …

00:33:18  |   Wed 01 Feb 2023
Because Hackers are Working Harder

Because Hackers are Working Harder

The numbers continue to roll in, and they’re not getting better … yet.

Ransomware attack payouts continue to grow, with the average topping out at $4.5 million in 2022. Similarly, malware attacks con…

00:21:16  |   Mon 23 Jan 2023
Our Cyber Defense Gets a D+

Our Cyber Defense Gets a D+

As the world of cybersecurity continues to spawn new threats and present the industrial sector with increasingly complex prevention, detection and response needs, we’re seeing similar advancements on…

00:21:51  |   Fri 13 Jan 2023
Protecting Against 'Dormant Footholds' and Knowing You're a Target

Protecting Against 'Dormant Footholds' and Knowing You're a Target

There’s a reason the term industrial-grade is used to express the highest levels of reliability and durability for products. After all, if a material, technology or tool can handle the rigors and dem…

00:37:48  |   Fri 23 Dec 2022
The Little Things Are Still Killing

The Little Things Are Still Killing

As the saying goes, it’s the little things that kill. And in cybersecurity, that little thing can be as innocent as a singular mouse click on the wrong URL from a familiar-looking email. 

A recent rep…

00:29:55  |   Wed 21 Dec 2022
Why the Good Guys are Losing

Why the Good Guys are Losing

The MIT Technology Review Insights recently reported that midsize companies, which would mean manufacturing enterprises with annual revenues of between $200 - $700 million, were almost 500 percent mo…

00:46:52  |   Fri 09 Dec 2022
A Little Social Engineering Goes a Long Way

A Little Social Engineering Goes a Long Way

Recent data from cybersecurity software and services provider Mimecast offers some depth on the rising concerns presented by phishing attacks, with 96 percent of respondents acknowledging that their …

00:20:32  |   Mon 28 Nov 2022
Embracing The Devil Inside to Stifle Hackers

Embracing The Devil Inside to Stifle Hackers

One of the mantras that I’ve clung to from my childhood is drawn from one of my favorite toys and shows – GI Joe. Duke, Snake Eyes and the rest of the Joes always reinforced that “Knowing is half the…

00:20:53  |   Tue 22 Nov 2022
No Place to Hide When You Have Money and Data

No Place to Hide When You Have Money and Data

On a daily basis I see a tremendous amount of data and research flow through my inbox, but a recent report from Rackspace Technology really caught my attention.

According to a recent survey performed …

00:21:46  |   Tue 15 Nov 2022
From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat?

From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat?

GhostSec describes itself as a hacktivist group. Formed around 2015, the organization’s initial focus was shutting down ISIS websites and infiltrating their social media platforms. 

Recently, the orga…

00:22:12  |   Tue 08 Nov 2022
Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy

Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy

Ironically enough, one of the biggest challenges surrounding cyber defense in the industrial sector is a lack of data – data about the attacks, the attackers, their tactics and how they were able to …

00:28:01  |   Thu 27 Oct 2022
The Hack You Helped Create

The Hack You Helped Create

Welcome to Security Breach.

Today we’re going to discus a vulnerability within the industrial sector that is essentially a product of progress.

The enhanced data sharing capabilities and operational e…

00:19:13  |   Tue 18 Oct 2022
The Cloud is on Fire - Promise vs. Problem

The Cloud is on Fire - Promise vs. Problem

Today we’re going to discuss an evolving vulnerability in the industrial sector – the security of cloud data and networks. We’re obviously talking about the use of IT infrastructure that’s not physic…

00:21:17  |   Tue 20 Sep 2022
When Cyber Gangs 'Get Loud' - Responding to Dynamite Panda, LockBit and Others

When Cyber Gangs 'Get Loud' - Responding to Dynamite Panda, LockBit and Others

When discussing the industrial sector’s threat landscape, we often detail events that result from vulnerabilities discovered by hackers probing for soft spots within an organization’s networks, conne…

00:23:57  |   Wed 31 Aug 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Eric Sorensen. This content is not affiliated with or endorsed by eachpod.com.