Breach halka açık
[search 0]
Daha fazla
Download the App!
show episodes
 
Artwork
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
After the Breach Podcast

Jeff Friedman and Sara Shimazu

Unsubscribe
Unsubscribe
Aylık
 
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
  continue reading
 
Artwork

1
Breachside Broadcast

Wyrd Miniatures, LLC

Unsubscribe
Unsubscribe
Aylık+
 
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
  continue reading
 
Artwork

1
Breached

Breached Podcast

Unsubscribe
Unsubscribe
Aylık
 
Each episode of Breached highlights a different issue that has been traditionally framed as an essential element of any American social contract. Over ten episodes, the podcast explores areas of American life where some sort of bargain between us – either explicit or implicit – no longer seems to stand.
  continue reading
 
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
  continue reading
 
Artwork

1
Reality Breached

Sergio Lugo II, Reid Walker, Josh Alcaraz, Robert Morris & Others

Unsubscribe
Unsubscribe
Aylık
 
Reality Breached is a Podcast about Video Games, Movies and…well, I guess we are still trying to figure that out. Things tend to get weird, enjoy…subscribe and tell your friends.
  continue reading
 
Artwork
 
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://podcasters.spotify.com/pod/show/intothebreach/support
  continue reading
 
Artwork

1
The Breach Files

Scott Harris

Unsubscribe
Unsubscribe
Günlük+
 
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
  continue reading
 
Artwork

1
Hot Breach Podcast

by Get Flanked, Prodigio Pete & Rogue-9

Unsubscribe
Unsubscribe
Günlük+
 
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
  continue reading
 
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
  continue reading
 
Artwork
 
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Artwork

1
Tom McCartan's Breach Of Etiquette

Sauropod: Podcasting the 21st Century

Unsubscribe
Unsubscribe
Aylık
 
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
  continue reading
 
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
  continue reading
 
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
  continue reading
 
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

Unsubscribe
Unsubscribe
Aylık
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
  continue reading
 
Loading …
show series
 
How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield. Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over $307 billion on…
  continue reading
 
On Episode 27 of After the Breach podcast co-hosts Jeff and Sara share all about the most recent sightings from the Salish Sea. It has been a busy few weeks whale-wise and the duo felt they needed to catch up about it almost as soon as they had finished recording the previous episode! Dive in with them as they talk about the families that have been…
  continue reading
 
In part one of "Uncharted Waters," Maxine Agassiz and her crew set out aboard the Exploration Vessel Superior to unravel the nautical mysteries created by the arrival of the Burning Man. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth C…
  continue reading
 
The good, the bad and the ugly of mobile device security in the expanding OT attack landscape. Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to a recent report from Imprivata, only 46…
  continue reading
 
It's not always about the ransom, data theft or denial of service. Many cheered with the recent crackdowns on groups like LockBit, and rightfully so. However, the harsh reality is that most of these victories are short-lived. For example, after law enforcement seized control of multiple LockBit websites and stolen data, the group was back to runnin…
  continue reading
 
Episode 26 of After the Breach Podcast finds co-hosts, Jeff and Sara, reunited after Jeff’s trip to the Silver Bank to swim with humpback whales at the largest breeding ground in the world for North Atlantic humpback whales. Jeff shares some of the amazing highlights from his time there, including swimming with a singer and spending time viewing a …
  continue reading
 
How we're failing to properly support and train our most important cybersecurity asset. According to Nozomi Networks February 2024 OT-IoT Security Report, manufacturing was exposed to more common vulnerabilities and exposures, or CVEs, than any other sector - realizing a 230 percent year-over-year increase in this area. Addressing even a fraction o…
  continue reading
 
Threat intelligence is important, but why manufacturers should focus on risk factors first. When it comes to the industrial sector’s ongoing cybersecurity challenges, we all know that there's more to defend, but what is most concerning is that we’re not responding quickly enough to the expanding threat landscape. In case you needed proof, here are …
  continue reading
 
The sector's (forced) cyber awakening needs to focus on making it harder to be a hacker. Regardless of how complex the attack, how organized the hacker, or how advanced the tools and tactics, security solutions usually lie in very fundamental practices. So, while you might think you already know enough about segmentation strategies, framework devel…
  continue reading
 
On Episode 25 of After the Breach Podcast, co-hosts Jeff and Sara welcome back their friend and colleague, Gary Sutton. Aside from being a captain in the Salish Sea he has also been working with OceanWise as a researcher and he joins in to talk about the research he’s a part of and some exciting upcoming projects. Before they get into that the thre…
  continue reading
 
How thinking like a hacker can lead to better cybersecurity ROI and avoid the dreaded "hope" strategy. Regardless of what you might hear from some, ransomware in the industrial sector is at an all-time high in terms of frequency and cost. Zero day and day one vulnerabilities are being discovered at a historic level and patching continues to be a ch…
  continue reading
 
Creating an OT vision, and why hackers are "like water." With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of the enterprise, detection and response strategies can be universally dissected in addressing ransomware, phishing or any number of social engineering ap…
  continue reading
 
Episode 24 of After the Breach is a long-awaited FAQ episode. Co-hosts, Jeff and Sara have been collecting questions from listeners and guests to Maya’s Legacy Whale Watching for a while and now they’re going to sit down and answer as many as they can. This will be the first FAQ episode but with the amount of questions received there will eventuall…
  continue reading
 
This week, Emma Paling sits down with Alex Cosh of The Maple to discuss his exclusive story on Canada’s weapons exports to Israel. As Cosh explains, it’s not just Liberal doublespeak that makes it hard to nail down the details of Canada’s weapons exports. Canada’s system has structural features that make it impossible to know exactly how many goods…
  continue reading
 
Hacker insight and vulnerability updates are great, but that's only half the battle. An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of new automation technologies with the challenges of securing the OT environment and supply chain. This led Cybersixgill to predict that in 2024, more com…
  continue reading
 
The tech that's helping social engineers expand current exploits, including credential harvesting. In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including: The double-edged sword of credential harvesting hacks. How data th…
  continue reading
 
Episode 23 finds co-hosts Jeff and Sara back home in Washington State after their visit to Bremer Bay, Western Australia. Join these (more than) slightly jet-lagged whale enthusiasts as they chat once again with their friend and colleague, April Ryan, about their trip down under. This will be the last episode dedicated to their January trip though …
  continue reading
 
Trans activist Celeste Trianon sits down with Katia Lo Innes to discuss Alberta’s new anti-trans policies. Danielle Smith’s new gender identity bill is the most extreme anti-trans law that has been proposed in Canada. It bans puberty blockers for children under the age of 15 and outright bars trans girls and women from sports. Trianon breaks down h…
  continue reading
 
How prioritizing the wrong data and assets is leading to more cyber risk. When it comes to OT security, the cruel reality is that the bad guys are doing what most predators do over time – they continue to hunt and evolve. This evolution allows hackers to constantly adjust to new security protocols and more rapidly react to common vulnerabilities – …
  continue reading
 
How the legacy of OT innovation contributes to cyber challenges. Vulnerabilities across the cybersecurity landscape are obviously trending in an upward direction. Perhaps most concerning, however, is the number of zero and one-day vulnerabilities being uncovered in key industrial control systems by many of the sector’s leading providers of software…
  continue reading
 
Episode 22 of After the Breach finds co-hosts, Sara and Jeff, still down in Bremer Bay, Western Australia with their friend and colleague, April Ryan. They have had so many encounters over the past two weeks and there’s so much to share! This time around the three of them share a quick highlight reel of just a few of the things that have stood out …
  continue reading
 
Two recent vulnerabilities, one traditional and one frighteningly unique, could reshape industrial cybersecurity. In this episode, we’re going to dive into two recently detected vulnerabilities that could have a significant impact on the industrial sector, as they involve two companies with wide-reaching influence on manufacturers of all sizes. One…
  continue reading
 
Mike Messick joins our latest episode to share his career experience as an ISP analysis for the state of Alaska and then move on to start his own company (Deep Forest Security) as an Incident Responder. Mike and his team of security professionals help organizations large and small to both prevent and resolve crippling cybersecurity events.…
  continue reading
 
Episode 21 of After the Breach finds co-hosts, Jeff Friedman and Sara Shimazu, coming to you from on the road. The two are down in Bremer Bay, Western Australia for the month of January and with them is their colleague and episode guest, April Ryan, who joined them on Episode 8 “Orcas Take a Minke Whale”. The three have been out on the water nearly…
  continue reading
 
Elizabeth Osborne, COO of Great Lakes Credit Union joins #breachesandbrews to highlight how AI will bring her members value in 2024. An investment that will certainly pay off over the holidays when there tends to be a spike in call center traffic.Rivial Data Security tarafından oluşturuldu
  continue reading
 
Elevated social engineering, more connections and growing extortion amounts will drive attack growth. Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted in a large quantity of the aerospace giant’s data being stolen. One of the experts we tapped into in breaking down the attack, and its…
  continue reading
 
Coordinating patches, covering the basics and not falling for 'pinky promises.' Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One of the experts we tapped into in breaking down the attack, and its fallout, was KnowBe4’s Erich Kron. You can check that episode out in our archives. I…
  continue reading
 
A former black hat offers insight on defending against hackers that "go for the throat every time." One of the mindsets shared by hackers and their corporate victims is the desire to put a successful bow on the calendar year. For you this could mean hitting a collection of shipping dates, production quantities or equipment implementations. What man…
  continue reading
 
This week, Martin Lukacs interviews Eriel Deranger, a member of the Athabasca Chipewyan First Nation and the executive director of Indigenous Climate Action. She gives us the 4-1-1 on this year’s UN climate summit in Dubai, United Arab Emirates, including the influx of fossil fuel lobbyists, Canada’s paltry commitment to financing Global South coun…
  continue reading
 
In part two of “The Slaughter at Stone Hill,” the gremlins of the bayou are out for revenge after the villagers of Stone Hill were slaughtered by a band of mercenaries led by explorer Christopher Arkwright. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock…
  continue reading
 
Accidental advancements by state-sponsored hackers are impacting ICS security, and elevating network visibility needs. Amongst the traditional threats to manufacturing enterprises and industrial control systems are the escalating roles of state-sponsored hacker groups. Refined through recent hostilities in the Ukraine and Gaza Strip, more and more …
  continue reading
 
MITRE’s ATT&CK knowledgebase, and the intrusion patterns, hacker tactics and response data it provides. While there are a number of indicators showing the positive direction in which industrial cybersecurity is heading, it's still worth taking a look at some of the more alarming facts impacting our current situation. For example, Fortinet is report…
  continue reading
 
On this episode of After the Breach podcast, hosts Jeff Friedman and Sara Shimazu are joined by Monika Wieland Shields from Orca Behavior Institute to recap the season in numbers. We discuss sightings data for both Southern Resident killer whales (salmon eaters) and Bigg's killer whales (marine mammal eaters), and recap some incredible stories from…
  continue reading
 
Balancing resources to keep the bad guys out, improve real-time visibility, and develop quicker responses to new attacks. In what might be legendary singer Johnny Cash's most famous song, he speaks of keeping his eyes wide open all the time, and those tasked with OT security responsibilities are finding that they too need to walk the line. In the c…
  continue reading
 
Industry experts assess the ransomware attack, the attacker, and critical takeaways for manufacturers of all sizes. Recently, one of the most high-profile manufacturers in the world – Boeing – suffered what they’re describing as a “cyber incident”, which resulted in a large, but unknown quantity of data being stolen and held for ransom by the notor…
  continue reading
 
Loading …

Hızlı referans rehberi