
Security Breach Podcast
1) Threat Landscape Update
Discussing the ever-expanding threat landscape is something we do a lot on Security Breach, but this episode is dedicated exclusively to topics like zero-day vulnerabilities, nation-state threats, phi...Show More
2) Cure Me or Kill Me - The Little Things That Escalate Attacks
As loyal listeners of this podcast know, I’m a big believer in paying close attention to the little things, the blocking and tackling, the basics, the fundamentals. All those elementary elements that ...Show More
3) Being 'Proactively Paranoid, Not Paralyzed'
As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different con...Show More
4) Why More Hackers Are Logging On Than Breaking In
We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks. Additionally, honing in on the human element of cyberse...Show More
5) You Think You Know Me
Who are you? This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. My conversation with Brandon Traffanstedt, Sr. Director and Global...Show More
6) Avoiding the Ostrich Approach
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So ...Show More
7) 'We've Made Our Own Prison'
Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge. Regardless of the situation or dynamic, everyone likes to think that they’re special. However, wi...Show More
8) Dark AI Speeding Hacker Evolution
In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, fa...Show More
9) Why Ransomware, Credential Theft and Phishing Schemes Persist
One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new too...Show More
10) Insecure Webcam Was All a Ransomware Group Needed
Endpoint security tools worked, but the hackers worked harder for their payday. While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import ele...Show More