Artwork

内容由Eric Sorensen提供。所有播客内容(包括剧集、图形和播客描述)均由 Eric Sorensen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Avoiding 'Shiny New Objects'

34:41
 
分享
 

Manage episode 375791777 series 3352216
内容由Eric Sorensen提供。所有播客内容(包括剧集、图形和播客描述)均由 Eric Sorensen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.
A recent report from OT cybersecurity solutions provider Cyolo discussed several factors related to secure remote access in the industrial sector. Specifically, it identified a lack of visibility, insufficient user education and training, and weak access control as the top three cybersecurity deficiencies currently facing Cyolo’s industrial customers – all of which were referenced by more than 50 percent of those surveyed.
Cyolo also reported on the most highly implemented solutions, which survey respondents identified as defense in depth, network segmentation and multi-factor authentication.

The guest for this episode is Matthew Cosnek, senior business development manager of OT cybersecurity services at Eaton – a leading supplier and manufacturer of motion control and power management systems and components.
He offers some unique perspective on a number of these topics, and we were also able to delve into the growing use of artificial intelligence, secure by design initiatives, state-sponsored hackers, and much more.

To catch up on past episodes of Security Breach, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

146集单集

Artwork

Avoiding 'Shiny New Objects'

Security Breach

0-10 subscribers

published

icon分享
 
Manage episode 375791777 series 3352216
内容由Eric Sorensen提供。所有播客内容(包括剧集、图形和播客描述)均由 Eric Sorensen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Send us a text

Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.
A recent report from OT cybersecurity solutions provider Cyolo discussed several factors related to secure remote access in the industrial sector. Specifically, it identified a lack of visibility, insufficient user education and training, and weak access control as the top three cybersecurity deficiencies currently facing Cyolo’s industrial customers – all of which were referenced by more than 50 percent of those surveyed.
Cyolo also reported on the most highly implemented solutions, which survey respondents identified as defense in depth, network segmentation and multi-factor authentication.

The guest for this episode is Matthew Cosnek, senior business development manager of OT cybersecurity services at Eaton – a leading supplier and manufacturer of motion control and power management systems and components.
He offers some unique perspective on a number of these topics, and we were also able to delve into the growing use of artificial intelligence, secure by design initiatives, state-sponsored hackers, and much more.

To catch up on past episodes of Security Breach, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

146集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南

版权2025 | 隐私政策 | 服务条款 | | 版权
边探索边听这个节目
播放