Breach 公开
[search 0]
更多
Download the App!
show episodes
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
  continue reading
 
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://podcasters.spotify.com/pod/show/intothebreach/support
  continue reading
 
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
  continue reading
 
Artwork

1
After the Breach Podcast

Jeff Friedman and Sara Shimazu

Unsubscribe
Unsubscribe
每月
 
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
  continue reading
 
Artwork

1
Breachside Broadcast

Wyrd Miniatures, LLC

Unsubscribe
Unsubscribe
每月+
 
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
  continue reading
 
Artwork

1
Repairers of the Breach

Ohadah Baht Ahveehzair

Unsubscribe
Unsubscribe
每月
 
Truth centered audio series. Torah based. Every change that takes place on Earth impacts and shapes our very lives. Ohadah’s intention is to bring a conscious awareness to the fact that the world we live in, is in need of the Truth. The 21st century is compelling our generation to reverse the old trend and write a new story. Ohadah hopes to inspire the listener to reach for their highest potential to contribute a change. If one adapts righteous thoughts and habits, the Truth has the Power to ...
  continue reading
 
Artwork

1
Breached

Breached Podcast

Unsubscribe
Unsubscribe
每月
 
Each episode of Breached highlights a different issue that has been traditionally framed as an essential element of any American social contract. Over ten episodes, the podcast explores areas of American life where some sort of bargain between us – either explicit or implicit – no longer seems to stand.
  continue reading
 
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
  continue reading
 
Artwork

1
Reality Breached

Sergio Lugo II, Reid Walker, Josh Alcaraz, Robert Morris & Others

Unsubscribe
Unsubscribe
每月
 
Reality Breached is a Podcast about Video Games, Movies and…well, I guess we are still trying to figure that out. Things tend to get weird, enjoy…subscribe and tell your friends.
  continue reading
 
Artwork
 
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
  continue reading
 
Artwork

1
Hot Breach Podcast

by Get Flanked, Prodigio Pete & Rogue-9

Unsubscribe
Unsubscribe
每天+
 
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
  continue reading
 
Artwork
 
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Artwork

1
Tom McCartan's Breach Of Etiquette

Sauropod: Podcasting the 21st Century

Unsubscribe
Unsubscribe
每月
 
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
  continue reading
 
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
  continue reading
 
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

Unsubscribe
Unsubscribe
每月
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
  continue reading
 
Loading …
show series
 
Ever set out for a simple morning walk only to find yourself deep in reflection about the curiosities of life? That's exactly what unfolded during my serene stroll around a southeast Georgia lake, and I've brought the entire experience to your ears. Lacing up for a five-mile trek, I muse on the underrated connection between physical activity and me…
  continue reading
 
This week, we would like to introduce you to Dark Dice, a podcast by Fool and Scholar Productions. This is the start of a new story: Shores of the Silver Thrum - featuring the full cast. If you have never listened to Dark Dice before, you can start here, as this season has no ties to previous ones... As waves crash and docks creek, five adventurers…
  continue reading
 
Many attacks on manufacturers are just the first step in going after even bigger targets. One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground for product performance. When we look at some of the technologies that have created seismic social shifts, tools like operational software, wireless con…
  continue reading
 
On Episode 28 of After the Breach co-hosts Jeff and Sara dive into Steller’s sea lion hunts, recent sightings, and some good news surrounding T109A3A. This spring has been one that has been filled with a lot of sea lion hunts. And for many of these hunts the whales involved have been, or included, the T049As. Jeff and Sara discuss what it’s like to…
  continue reading
 
Canadian doctors Yipeng Ge and Ben Thomson join The Breach’s Brishti Basu to discuss what they witnessed during humanitarian trips to Gaza. Soon after returning, they got surprise emails: international lawyers wanted their testimony to build a war crimes case against Israel. Meet the Canadian doctors testifying against Israel…
  continue reading
 
As I go through memories and old voice notes I left for myself I came across a good one that I recorded in January of 2023. This is when my life took me on a journey I had to prepare for at 22 years young. I traveled by myself and was away from home for almost a year. During this time I got to see people for who they were and observe the influences…
  continue reading
 
In this episode, we dive into some of the most notorious attacks to hit manufacturing over the last six months. In addition to speaking with cybersecurity experts from around the world for this podcast, I’ve also been able to do a fair amount of reporting on our websites regarding several high-profile industrial attacks. So, I felt like it could be…
  continue reading
 
A look back at Security Breach guest's most accurate and timely industrial cybersecurity predictions. As we near our 100th episode of Security Beach, I thought it would be a good time to take a look back at some of our guest’s predictions from the previous 12 months. If you want to check out the full episodes from any of these previous guests, you …
  continue reading
 
The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies. The origins of what we talk about here on Security Breach can go back to any number of transformational events, but the reality is that all of them contributed an individual component to the unique mosaic that is the legacy of industrial cybersecurity.…
  continue reading
 
How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield. Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over $307 billion on…
  continue reading
 
On Episode 27 of After the Breach podcast co-hosts Jeff and Sara share all about the most recent sightings from the Salish Sea. It has been a busy few weeks whale-wise and the duo felt they needed to catch up about it almost as soon as they had finished recording the previous episode! Dive in with them as they talk about the families that have been…
  continue reading
 
In part one of "Uncharted Waters," Maxine Agassiz and her crew set out aboard the Exploration Vessel Superior to unravel the nautical mysteries created by the arrival of the Burning Man. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth C…
  continue reading
 
The good, the bad and the ugly of mobile device security in the expanding OT attack landscape. Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to a recent report from Imprivata, only 46…
  continue reading
 
It's not always about the ransom, data theft or denial of service. Many cheered with the recent crackdowns on groups like LockBit, and rightfully so. However, the harsh reality is that most of these victories are short-lived. For example, after law enforcement seized control of multiple LockBit websites and stolen data, the group was back to runnin…
  continue reading
 
Episode 26 of After the Breach Podcast finds co-hosts, Jeff and Sara, reunited after Jeff’s trip to the Silver Bank to swim with humpback whales at the largest breeding ground in the world for North Atlantic humpback whales. Jeff shares some of the amazing highlights from his time there, including swimming with a singer and spending time viewing a …
  continue reading
 
How we're failing to properly support and train our most important cybersecurity asset. According to Nozomi Networks February 2024 OT-IoT Security Report, manufacturing was exposed to more common vulnerabilities and exposures, or CVEs, than any other sector - realizing a 230 percent year-over-year increase in this area. Addressing even a fraction o…
  continue reading
 
Threat intelligence is important, but why manufacturers should focus on risk factors first. When it comes to the industrial sector’s ongoing cybersecurity challenges, we all know that there's more to defend, but what is most concerning is that we’re not responding quickly enough to the expanding threat landscape. In case you needed proof, here are …
  continue reading
 
The sector's (forced) cyber awakening needs to focus on making it harder to be a hacker. Regardless of how complex the attack, how organized the hacker, or how advanced the tools and tactics, security solutions usually lie in very fundamental practices. So, while you might think you already know enough about segmentation strategies, framework devel…
  continue reading
 
On Episode 25 of After the Breach Podcast, co-hosts Jeff and Sara welcome back their friend and colleague, Gary Sutton. Aside from being a captain in the Salish Sea he has also been working with OceanWise as a researcher and he joins in to talk about the research he’s a part of and some exciting upcoming projects. Before they get into that the thre…
  continue reading
 
How thinking like a hacker can lead to better cybersecurity ROI and avoid the dreaded "hope" strategy. Regardless of what you might hear from some, ransomware in the industrial sector is at an all-time high in terms of frequency and cost. Zero day and day one vulnerabilities are being discovered at a historic level and patching continues to be a ch…
  continue reading
 
Creating an OT vision, and why hackers are "like water." With hackers repeatedly demonstrating that that they play no favorites in terms of the sector of manufacturing, its location, or the size of the enterprise, detection and response strategies can be universally dissected in addressing ransomware, phishing or any number of social engineering ap…
  continue reading
 
Episode 24 of After the Breach is a long-awaited FAQ episode. Co-hosts, Jeff and Sara have been collecting questions from listeners and guests to Maya’s Legacy Whale Watching for a while and now they’re going to sit down and answer as many as they can. This will be the first FAQ episode but with the amount of questions received there will eventuall…
  continue reading
 
This week, Emma Paling sits down with Alex Cosh of The Maple to discuss his exclusive story on Canada’s weapons exports to Israel. As Cosh explains, it’s not just Liberal doublespeak that makes it hard to nail down the details of Canada’s weapons exports. Canada’s system has structural features that make it impossible to know exactly how many goods…
  continue reading
 
Hacker insight and vulnerability updates are great, but that's only half the battle. An ever-expanding attack surface has created a number of complexities when it comes to combining the benefits of new automation technologies with the challenges of securing the OT environment and supply chain. This led Cybersixgill to predict that in 2024, more com…
  continue reading
 
The tech that's helping social engineers expand current exploits, including credential harvesting. In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including: The double-edged sword of credential harvesting hacks. How data th…
  continue reading
 
Episode 23 finds co-hosts Jeff and Sara back home in Washington State after their visit to Bremer Bay, Western Australia. Join these (more than) slightly jet-lagged whale enthusiasts as they chat once again with their friend and colleague, April Ryan, about their trip down under. This will be the last episode dedicated to their January trip though …
  continue reading
 
Trans activist Celeste Trianon sits down with Katia Lo Innes to discuss Alberta’s new anti-trans policies. Danielle Smith’s new gender identity bill is the most extreme anti-trans law that has been proposed in Canada. It bans puberty blockers for children under the age of 15 and outright bars trans girls and women from sports. Trianon breaks down h…
  continue reading
 
How prioritizing the wrong data and assets is leading to more cyber risk. When it comes to OT security, the cruel reality is that the bad guys are doing what most predators do over time – they continue to hunt and evolve. This evolution allows hackers to constantly adjust to new security protocols and more rapidly react to common vulnerabilities – …
  continue reading
 
How the legacy of OT innovation contributes to cyber challenges. Vulnerabilities across the cybersecurity landscape are obviously trending in an upward direction. Perhaps most concerning, however, is the number of zero and one-day vulnerabilities being uncovered in key industrial control systems by many of the sector’s leading providers of software…
  continue reading
 
Episode 22 of After the Breach finds co-hosts, Sara and Jeff, still down in Bremer Bay, Western Australia with their friend and colleague, April Ryan. They have had so many encounters over the past two weeks and there’s so much to share! This time around the three of them share a quick highlight reel of just a few of the things that have stood out …
  continue reading
 
Two recent vulnerabilities, one traditional and one frighteningly unique, could reshape industrial cybersecurity. In this episode, we’re going to dive into two recently detected vulnerabilities that could have a significant impact on the industrial sector, as they involve two companies with wide-reaching influence on manufacturers of all sizes. One…
  continue reading
 
Mike Messick joins our latest episode to share his career experience as an ISP analysis for the state of Alaska and then move on to start his own company (Deep Forest Security) as an Incident Responder. Mike and his team of security professionals help organizations large and small to both prevent and resolve crippling cybersecurity events.…
  continue reading
 
Episode 21 of After the Breach finds co-hosts, Jeff Friedman and Sara Shimazu, coming to you from on the road. The two are down in Bremer Bay, Western Australia for the month of January and with them is their colleague and episode guest, April Ryan, who joined them on Episode 8 “Orcas Take a Minke Whale”. The three have been out on the water nearly…
  continue reading
 
Elizabeth Osborne, COO of Great Lakes Credit Union joins #breachesandbrews to highlight how AI will bring her members value in 2024. An investment that will certainly pay off over the holidays when there tends to be a spike in call center traffic.由Rivial Data Security
  continue reading
 
Elevated social engineering, more connections and growing extortion amounts will drive attack growth. Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted in a large quantity of the aerospace giant’s data being stolen. One of the experts we tapped into in breaking down the attack, and its…
  continue reading
 
Coordinating patches, covering the basics and not falling for 'pinky promises.' Late last year we discussed Lockbit’s ransomware attack on Boeing, and the ensuing “cyber incident” that resulted. One of the experts we tapped into in breaking down the attack, and its fallout, was KnowBe4’s Erich Kron. You can check that episode out in our archives. I…
  continue reading
 
Loading …

快速参考指南