Security Breach

By Eric Sorensen

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Eric Sorensen

Category: Tech News

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 3
Reviews: 0
Episodes: 95

Description

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Episode Date
Supply Chains Are a Hacker's Gateway
May 16, 2024
The Hacks!
May 08, 2024
Security Breach: Predictions That Landed
May 01, 2024
DMZs, Alarm Floods and Prepping for 'What If?'
Apr 24, 2024
Weaponizing Secure-By-Design
Apr 17, 2024
The Impacts of Over-Connectivity and Mobile Defeatism
Apr 10, 2024
Hackers Learn How to Attack You, From You
Apr 03, 2024
The Largest Attack Surface - People
Mar 28, 2024
Avoiding a 'Chicken Little' Cybersecurity Strategy
Mar 21, 2024
Cybersecurity's Greatest Weapon - Awareness
Mar 13, 2024
Chasing Cyber Ghosts
Mar 06, 2024
Missteps Creating 'An Internal Collection of Hackers'
Feb 28, 2024
Leveraging Threat Intelligence Data
Feb 22, 2024
The Hacker's Most Lucrative Attack
Feb 15, 2024
SBOMs, AI and the Crown Jewels
Feb 07, 2024
Tech Debt and the Unsexy Side of Cybersecurity
Jan 31, 2024
What Happens When a Torque Wrench Gets Hacked
Jan 25, 2024
AI, ChatGPT Fueling Surge in Ransomware
Jan 09, 2024
New Strategies for Old-School Hacks
Jan 09, 2024
Learning from the Dark Side
Dec 20, 2023
The Growing Impact of Hacktivists and State-Sponsored Groups
Dec 13, 2023
Vulnerability Data from 'The Wild'
Dec 07, 2023
Walking the Line
Dec 01, 2023
Breaking Down the Boeing Hack
Nov 21, 2023
Turning Up the Cat & Mouse Game
Nov 16, 2023
This is the Way ... to Beat Hackers
Nov 10, 2023
Criminal Organizations Know You
Nov 02, 2023
Patches, PLCs and Making it Harder for Hackers
Oct 26, 2023
Why AI is Your Biggest Threat and Most Powerful Ally
Oct 19, 2023
The Ransomware Roller Coaster
Oct 11, 2023
'There's A Train Wreck Coming'
Oct 04, 2023
'They're Hitting Everyone They Can'
Sep 29, 2023
How Hackers are Targeting Vehicles and Fleets
Sep 20, 2023
Doubling Down to Beat the Hackers
Sep 14, 2023
Inside the Summer's Biggest Industrial Hacks
Sep 07, 2023
Avoiding 'Shiny New Objects'
Aug 30, 2023
Knowing 'What is Good'
Aug 23, 2023
Security Breach: 'The Edge Always Goes to the Attacker'
Aug 18, 2023
Phishing Lessons and 'Shifting the Target'
Aug 10, 2023
The Growing Problem of 'Insecure by Design'
Aug 04, 2023
Cloud Apps are Elevating Malware Threats
Jul 25, 2023
AI - Use It or Lose!
Jul 13, 2023
The Best Way to Identify, Defeat Hackers
Jun 29, 2023
The Impressive and Terrifying Evolution of Ransomware Gangs
Jun 21, 2023
Humans, 'Promiscuous Devices' Creating More Threats
Jun 13, 2023
Enemies at the Gate
Jun 07, 2023
The Bad Guys Are Salivating Over Manufacturing
Jun 01, 2023
More than Security, Cyber Defense Is 'Life Safety'
May 25, 2023
Making Hackers Pay (Literally)
May 18, 2023
Hackers Want to Steal, Extort Competitive Advantages
May 10, 2023
An Unlikely Assist from Ransomware and the Looming Threats of AI
May 03, 2023
Trusting the Creative Hacker
Apr 24, 2023
The Cybercriminal's Favorite Pastime
Apr 07, 2023
Balancing The Light and Dark Forces of Technology
Mar 30, 2023
Thinking Like the Bad Guy
Mar 23, 2023
Breaking Down the Dole Foods Ransomware Attack
Mar 16, 2023
The Air Gap Lie and The Spectrum of Extortion
Mar 08, 2023
Latest Ransomware Attacks Educate, then Humiliate
Feb 27, 2023
Hiding, Not Running from Hackers
Feb 20, 2023
Hacker's Insight: 'How Can I Make Stuff Worse'
Feb 13, 2023
When Seeing the Attack Isn't Enough to Stop It
Feb 07, 2023
People Are Part of the Damage
Feb 01, 2023
Because Hackers are Working Harder
Jan 23, 2023
Our Cyber Defense Gets a D+
Jan 13, 2023
Protecting Against 'Dormant Footholds' and Knowing You're a Target
Dec 23, 2022
The Little Things Are Still Killing
Dec 21, 2022
Why the Good Guys are Losing
Dec 09, 2022
A Little Social Engineering Goes a Long Way
Nov 28, 2022
Embracing The Devil Inside to Stifle Hackers
Nov 22, 2022
No Place to Hide When You Have Money and Data
Nov 15, 2022
From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat?
Nov 08, 2022
Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy
Oct 27, 2022
The Hack You Helped Create
Oct 18, 2022
The Cloud is on Fire - Promise vs. Problem
Sep 20, 2022
When Cyber Gangs 'Get Loud' - Responding to Dynamite Panda, LockBit and Others
Aug 31, 2022
Lessons Learned from DarkSide and the Solar Winds Hack
Aug 30, 2022
The Growing (and Frightening) Complexity of Ransomware Groups
Jul 26, 2022
Breaking Down the Silos
Jul 19, 2022
Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat
Jun 23, 2022
Preventing Ransomware Attacks Through Cyber Maintenance
May 19, 2022
Cyber Hygiene and Putin's Army of Criminal Hackers
May 19, 2022
Revisiting the JBS Ransomware Attack One Year Later
May 19, 2022
'The Bad Guys Are Smart, Too'
May 17, 2022
'The Industry's Attack Surface Has Exploded'
May 17, 2022
DDoS Attacks (Part 1): 'They're Super Easy and Free'
May 17, 2022
DDoS Attacks - (Part II): Preparation is Prevention
May 17, 2022
Why Phishing Schemes Continue to Flourish
May 16, 2022
'Hackers are Lazy. Scammers are Misfits.'
May 16, 2022
'Hackers Are Heartless Bastards'
May 16, 2022
Ransomware, Log4J and When — not if — You're Hacked
May 16, 2022
Don't Fear the Hacker — Drop Some S-BOMs
May 16, 2022
Know Your Enemy
May 16, 2022
There's a Lot of Reasons October Could Be Terrifying
May 16, 2022
The Dangerous Reality of Your Cybersecurity Blast Radius
May 16, 2022
Inside a Phishing Scheme
May 16, 2022