Security Breach
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
Episodes
125 episodes
A Happy Ending to the Latest ICS Hack
The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this ep...
•
30:11
The Biggest Hacks of 2024
Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecur...
•
40:47
Looking Back to Move Forward
As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months.While I’m grateful for everyone we’ve had on the show, and all the support we continue ...
•
42:15
AI Is Exposing Your Most Vulnerable Attack Surface
According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percen...
•
36:04
Minimizing Hacks by Focusing on Uptime
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense lo...
•
39:21
What Cybersecurity Can Learn from Tom Brady
We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a ...
•
53:26
Threat Landscape Update
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks eman...
•
39:02
The Little Things That Kill
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.We know that the frequency of attacks will continue to increase.We know that it’s not if your ICS...
•
38:50
Phishing Attack Defense 'Not Rocket Science'
Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a ...
•
22:22
Legacy Mindsets Are Helping Hackers Weaponize Networks
So, my daughters like to give me a hard time about growing old. Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they wor...
•
42:55
Using Force Multipliers to Protect Against Next-Gen Stuxnet
While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings.SonicWall’s ...
•
40:29
Never Let a Good Hack Go to Waste
One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approach...
•
33:45
Finding Your 'Creative Maliciousness'
According to Veeam’s 2024 Ransomware Trends Report, cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of Security Breach guests h...
•
39:24
Getting Past the Whack-A-Mole Approach
The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-ma...
•
36:17
Inside the Growing Complexity of Ransomware Hacking Groups
We’re back to discuss an all-too-familiar topic – ransomware.Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for ...
•
32:48
Time to 'Rip off the Band-Aid' to Ensure Security
A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges.In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investm...
•
39:59
Combating the 20th Century Mafia with a Stronger Human Firewall
Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 20...
•
46:53
Tearing Down the 'Set It and Forget It' Mindset
I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly ever...
•
42:40
Bridging the IT-OT Divide
When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One...
•
20:30
'There's No Bulletproof Vest' in Cybersecurity
An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneou...
•
52:15
Are We Over-Connected?
The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we continue to produce Security Breach, an...
•
19:51
The $25M 'Wake-Up Call' Supply Chain Hack
According to IBM’s Cost of a Data Breach Report, nearly 20 percent of the organizations surveyed stated that they have experienced a breach stemming from a compromise in their supply chain, or a vulnerability related to it. The average...
•
31:28
The Dollars and Sense of Cybersecurity
Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber R...
•
41:13