『Security Breach』のカバーアート

Security Breach

Security Breach

著者: Eric Sorensen
無料で聴く

このコンテンツについて

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

© 2025 Security Breach
政治・政府
エピソード
  • New Patching Strategies for Old Vulnerabilities
    2025/10/16

    Send us a text

    While there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initiatives seen as more fundamental to the core mission of getting finished product out the door.

    However, a couple of recent reports could help connect the dots between production and security, and the need to fund both.

    First, there’s Adaptiva’s State of Patch Management Report that found 75 percent of manufacturing companies have critical vulnerabilities with a CVSS score of 8 or higher, and 65 percent have at least one vulnerability listed in the CISA Known Exploited Vulnerabilities Catalog. So, hackers know about these weaknesses and they’re taking advantage of them.

    And, according to Black Kite’s 2025 Manufacturing Report, 51 percent of those surveyed indicate that patching has become a bigger challenge than intrusion detection, and more than 75 percent indicate that both IT and security must approve patches before deployment.

    Reading between the lines – patching takes too long and is too complicated, so the vulnerabilities persist and the hackers keep winning.

    Watch/listen as we discuss these and other topics with Chaz Spahn, the Director of Product Management at Adaptiva.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Inspiring Tech Leaders - The Technology Podcast
    Interviews with Tech Leaders and insights on the latest emerging technology trends.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    27 分
  • The Wild & Weird of Industrial Cybersecurity
    2025/10/03

    Send us a text

    When talking to the experts and leading authorities that have participated in the 140+ episodes of Security Breach, there’s always a slight pause when directing their attention specifically to the industrial sector. That’s because, well, we’re special.

    There’s the unique juxtaposition of old and bleeding edge technology.

    There’s the influx of greater connectivity combatting the struggles to identify and secure the growing number of endpoints.

    And there are the ongoing battles related to secure-by-design responsibilities, cloud networks and the ever popular building and breaking down of IT/OT silos.

    The good news is that we’re getting better. Better at identifying the problems and better at elevating solutions from some of the sharpest minds in the sector. And we’re fortunate to be able share these insights from an incredible collective on today’s episode.

    Watch/listen as Max Clausen, senior VP of Network Connectivity at Zayo, John Carse, Field CISO at SquareX, Sophos’ Chester Wisniewski and ExtraHop’s Chad Lemaire tackle topics that include:

    • Visibility
    • Secure-by-Design
    • Artificial Intelligence
    • IT/OT Silos
    • Patching
    • LOTL and Phishing Attacks
    • Non-standard OT Architecture

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Inspiring Tech Leaders - The Technology Podcast
    Interviews with Tech Leaders and insights on the latest emerging technology trends.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    31 分
  • Using AI to Stay Ahead of the Hack
    2025/09/18

    Send us a text

    I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure.

    But what if we took a little different route.

    In this episode we're going to explore how AI can help make your people better at managing cybersecurity. We know there’s a huge talent pool shortage, and the challenges of keeping employees vigilant against repeated attacks continues to grow.

    So, watch/listen as I explore these dynamics, well as many others, with Grant Oviatt - Head of Security Operations for Prophet Security – a company that recently unveiled their State of AI in SecOps 2025 research report. A lot of the data from the report was rather shocking, especially when the survey repeatedly uncovered how many SOCs, inundated with constant intrusion alerts, have experienced numerous breaches simply because the volume of critical alert notifications has made them easier to ignore.

    It was a great conversation, with numerous takeaways, including:

    • Why 60 percent of security teams have experienced critical breaches stemming from overlooked alerts.
    • How security leaders anticipate AI solutions handling more tasks within the SOC over the next 3 years.
    • Reasons for 57 percent of organizations deliberately suppressing detection rules and accepting higher risks to keep operations moving.
    • How hackers are using AI beyond just phishing campaigns to get access to critical assets and networks.
    • How the industrial sector can better implement AI without yielding to internal pressures.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Inspiring Tech Leaders - The Technology Podcast
    Interviews with Tech Leaders and insights on the latest emerging technology trends.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    続きを読む 一部表示
    32 分
まだレビューはありません