使用Player FM应用程序离线!
The Hacker's Most Lucrative Attack
Manage episode 401339207 series 3352216
The tech that's helping social engineers expand current exploits, including credential harvesting.
In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including:
- The double-edged sword of credential harvesting hacks.
- How data theft is providing greater visibility of an organization's supply chain and partners in helping cybercriminals accumulate more potential targets.
- The challenges of implementing and sustaining data hygiene practices.
- Using AI to to fill cybersecurity jobs.
- How new technology, like AI, is helping cybercriminals lower their operating costs.
- Understanding that you can't defend what you don't know or understand about your internal landscape.
- Embracing the benefits of IIoT, but understanding the security risks it carries.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
104集单集
Manage episode 401339207 series 3352216
The tech that's helping social engineers expand current exploits, including credential harvesting.
In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including:
- The double-edged sword of credential harvesting hacks.
- How data theft is providing greater visibility of an organization's supply chain and partners in helping cybercriminals accumulate more potential targets.
- The challenges of implementing and sustaining data hygiene practices.
- Using AI to to fill cybersecurity jobs.
- How new technology, like AI, is helping cybercriminals lower their operating costs.
- Understanding that you can't defend what you don't know or understand about your internal landscape.
- Embracing the benefits of IIoT, but understanding the security risks it carries.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
104集单集
ทุกตอน
×欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。