1. EachPod

Security Breach - Podcast

Security Breach

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Business News Tech News News Technology
Update frequency
every 7 days
Average duration
32 minutes
Episodes
140
Years Active
2022 - 2025
Share to:
Lessons Learned from DarkSide and the Solar Winds Hack

Lessons Learned from DarkSide and the Solar Winds Hack

When the Eastern European hacker group DarkSide shut down the Colonial Pipeline in May of 2021, the ramifications were felt across numerous landscapes.

In addition to impacting air travel and triggeri…

00:22:52  |   Tue 30 Aug 2022
The Growing (and Frightening) Complexity of Ransomware Groups

The Growing (and Frightening) Complexity of Ransomware Groups

Tenable recently released their Ransomware Ecosystem white paper. So we sat down with Satnam Narang, a research engineer focused on security response at the company, to discuss some its findings, inc…

00:16:27  |   Tue 26 Jul 2022
Breaking Down the Silos

Breaking Down the Silos

A great deal of cybersecurity attention, and rightfully so, is paid to the role of defending against and responding to outside attackers. However, just as important to establishing and reinforcing cy…

00:18:32  |   Tue 19 Jul 2022
Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat

Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat

What else can we say as it relates to the industrial sector and the cybersecurity threats that continue to present themselves, other than – the battle wages on.

The value of the sector’s IP, the pleth…

00:12:03  |   Thu 23 Jun 2022
Preventing Ransomware Attacks Through Cyber Maintenance

Preventing Ransomware Attacks Through Cyber Maintenance

There were a lot of trends emanating from the mid-1980s that thankfully died out over time, but one of them has not only persisted, but thrived. Although there were numerous samples of malware impact…

00:18:11  |   Thu 19 May 2022
Revisiting the JBS Ransomware Attack One Year Later

Revisiting the JBS Ransomware Attack One Year Later

JBS Foods is a $30B meat processor that most people didn’t know about until they paid ransomware attackers REvil $11M last June in order to get plants in the U.S. and Brazil up and running, and preve…

00:14:57  |   Thu 19 May 2022
Cyber Hygiene and Putin's Army of Criminal Hackers

Cyber Hygiene and Putin's Army of Criminal Hackers

The rise in ransomware attacks throughout the industrial sector has led to a surge in another, related activity – the purchasing of cyber insurance to help soften the blow of these attacks.

But today’…

00:18:00  |   Thu 19 May 2022
'The Bad Guys Are Smart, Too'

'The Bad Guys Are Smart, Too'

You’ve probably heard a number of reports citing ransomware as the leading attack strategy within the industrial sector. In some instances, it’s been reported that ransomware groups are focusing as m…

00:18:45  |   Tue 17 May 2022
'The Industry's Attack Surface Has Exploded'

'The Industry's Attack Surface Has Exploded'

The surge in cyberattacks experienced by the industrial sector has been credited to a number of issues ranging from outdated security software to lagging protocols surrounding data access and storage…

00:18:34  |   Tue 17 May 2022
DDoS Attacks - (Part II): Preparation is Prevention

DDoS Attacks - (Part II): Preparation is Prevention

The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cybe…

00:12:21  |   Tue 17 May 2022
DDoS Attacks (Part 1): 'They're Super Easy and Free'

DDoS Attacks (Part 1): 'They're Super Easy and Free'

The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cybe…

00:12:25  |   Tue 17 May 2022
Don't Fear the Hacker — Drop Some S-BOMs

Don't Fear the Hacker — Drop Some S-BOMs

Regardless of the report, survey or research, all data related to industrial cybersecurity makes one thing very clear – the last two years have presented a dangerous uptick in the number of cybersecu…

00:13:03  |   Mon 16 May 2022
Know Your Enemy

Know Your Enemy

While rogue individuals with an agenda and advanced cybersecurity skills are still prevalent, most headline-grabbing hacks are now originating from well-organized, highly talented groups or organizat…

00:13:58  |   Mon 16 May 2022
Ransomware, Log4J and When — not if — You're Hacked

Ransomware, Log4J and When — not if — You're Hacked

Whether it's the infamous Colonial Pipeline ransomware attack last summer, or an ongoing number of water treatment facility hacks, there’s no doubt that infrastructure facilities have become a favori…

00:14:01  |   Mon 16 May 2022
'Hackers are Lazy. Scammers are Misfits.'

'Hackers are Lazy. Scammers are Misfits.'

If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a…

00:19:36  |   Mon 16 May 2022
Why Phishing Schemes Continue to Flourish

Why Phishing Schemes Continue to Flourish

In this episode we welcome Theo Zafirakos, the Chief Information Security Officer at Terranova Security, to discuss is company's recently report indicating that the success of phishing schemes contin…

00:14:06  |   Mon 16 May 2022
'Hackers Are Heartless Bastards'

'Hackers Are Heartless Bastards'

If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a…

00:17:34  |   Mon 16 May 2022
The Dangerous Reality of Your Cybersecurity Blast Radius

The Dangerous Reality of Your Cybersecurity Blast Radius

In this episode of Security Breach, we're joined by Brian Vecci, the Field CTO of Varonis,  - a leading provider of cyber threat detection and response compliance software.

Varonis recently published …

00:19:40  |   Mon 16 May 2022
Inside a Phishing Scheme

Inside a Phishing Scheme

In this episode of Security Breach, we're joined by Thierry Aubry, a Sales Executive at Open Systems

Open Systems recently offered a look inside a phishing scheme and potential malware attack experi…

00:15:03  |   Mon 16 May 2022
There's a Lot of Reasons October Could Be Terrifying

There's a Lot of Reasons October Could Be Terrifying

In addition to supply chain challenges and labor shortages, one of the biggest issues emerging from the COVID-19 pandemic for the industrial sector has been the huge uptick in cyberattacks.

To make th…

00:13:42  |   Mon 16 May 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Eric Sorensen. This content is not affiliated with or endorsed by eachpod.com.