Security Breach Podcast
1) Finding the Soul of a Pirate
Send us Fan Mail We all know that cybersecurity, and industrial cybersecurity in particular, is facing a huge talent deficit. Finding an individual who not only understands the technical elements of ...Show More
2) Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks
Send a text Although discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can’t be ignored. And...Show More
3) Hybrid Warfare is Upon You
Send a text Last December the Cybersecurity and Infrastructure Security Agency, or CISA, issued an advisory warning manufacturers, operators of critical infrastructure, and really anybody associated w...Show More
4) Security Breach: Strengthening Your Weakest Links
Send a text When we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it’s tough to avoid what I’d call the usual suspects - endpoints, connecti...Show More
5) Clarifying the Big-Picture Impacts of CMMC
Send us a text Back in 2020, the Department of Defense, as it was called at the time, introduced the Cybersecurity Maturity Model Certification (CMMC). It carried the goal of ensuring companies would ...Show More
6) Shiny Objects and the Power of Preparation
Send us a text "You don't have to get hacked to understand how you can get hacked." While I utilize that editorial director title to introduce myself before every episode of Security Breach, it’s not ...Show More
7) You Don't Have to Out-Tech the Hacker
Send us a text We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI...Show More
8) Speaking the Right Language
Send us a text Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie The Usual Suspects might resonate...Show More
9) Why People Are Not the Biggest Risk
Send us a text While I’ll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: "The hands can't ...Show More
10) Preserving Uptime in the Face of Evolving Attacks
Send us a text Uptime. It’s the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or cripplin...Show More