『Security Breach』のカバーアート

Security Breach

Security Breach

著者: Eric Sorensen
無料で聴く

このコンテンツについて

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

© 2026 Security Breach
政治・政府
エピソード
  • Shiny Objects and the Power of Preparation
    2026/01/09

    Send us a text

    "You don't have to get hacked to understand how you can get hacked."

    While I utilize that editorial director title to introduce myself before every episode of Security Breach, it’s not the title that I’ve used the longest, think about the most, or with which I would hope to obtain the most acclaim. Rather, the job descriptor that meets all those requirements is the title of ... Dad.

    And perhaps the phrase most commonly utilized during my ongoing tenure in this position is some form of "are you ready?"

    Whether it was preparing to push a swing, toss a pitch or start a car, inquiring as to the state of my daughter’s readiness was always the first, most important, and yet most basic action I took.

    I was reminded of this when speaking with our guest for this episode, Itzik Kotler, the co-founder and CTO of SafeBreach. While our conversation took us down a number of paths in discussing “shiny objects”, the problems with silos, and the evolution of hackers, he kept coming back to the basics, or what I like to constantly describe as the blocking and tackling of cybersecurity.

    At the heart of the focus on the basics is taking steps to be prepared for when, not if, you’re targeted by hackers.

    So, if you're ready, listen as we discuss:

    • Why every manufacturer is either a target or connected to a bigger target via their supply chain connections.
    • The lure of "shiny objects", and how they can distract from the best approaches to cybersecurity upgrades.
    • How hackers are exploiting the complexities of your environment.
    • Why security strategies need to start with understanding what is truly at risk, and what level of risk is acceptable.
    • The growing need for detection engineering.
    • Evolving your enterprise in realizing that "hackers don't work in silos."
    • The role AI can play in addressing alert fatigue.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    44 分
  • You Don't Have to Out-Tech the Hacker
    2025/12/19

    Send us a text

    We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today’s episode.

    Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he’s now working with cyber researchers to help promote their findings and get the vulnerabilities they detect into the hands of the software, network or equipment suppliers before hackers can leverage these findings, and wreak havoc on industrial control systems and production workflows.

    Listen as we discuss this strategy, as well:

    • How to define roles and responsibilities in pushing Secure-by-Design initiatives forward.
    • Why manufactures shouldn't look to out-tech the hacker.
    • Strategies to help defenders from having to keep playing catch-up.
    • How cybersecurity can be utilized as an operational tool.
    • The ongoing challenges created by Zero Day vulnerabilities.
    • Creating a culture that goes beyond just "spending for the cyber nerd."
    • New ways to calculate ROI in advancing cybersecurity priorities.
    • The cost benefits of investing in cyber talent.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    41 分
  • Speaking the Right Language
    2025/12/04

    Send us a text

    Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie The Usual Suspects might resonate with most, the original attribution goes to French poet Charles Baudelaire.

    The quote came to mind in preparing for my conversation with Tim Chase, Principal Technical Evangelist for Orca Security. I knew we were going to be discussing topics where the biggest implementation challenges typically resonate from OT asset owners who don’t see the need to address these topics.

    Or, with all due respect to Baudelaire, the greatest trick hackers ever pulled was convincing the industrial sector that they didn’t care.

    The good news is that folks like Tim are aware of these situations, and working to offer some new solutions. Watch/listen as we discuss:

    • How vital it is to define security responsibilities.
    • The growing need for cloud security education.
    • Why a top-down approach is vital for creating a security-focused culture.
    • The benefits of creating internal security champions.
    • The annoying, but growing significance of SBOMs.
    • Combatting alert fatigue.
    • The biggest challenges AI is creating for cybersecurity.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    47 分
まだレビューはありません