
Security Breach
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
Episodes
137 episodes
Why More Hackers Are Logging On Than Breaking In
We’ve heard it before – hacker tactics are not changing, but the hackers are getting a lot smarter in how they deploy their time-tested attacks.Additionally, honing in on the human element of cybersecurity is nothing new. We’ve spoken wi...
•
33:04

You Think You Know Me
Who are you?This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. My conversation with Brandon Traffanstedt, Sr. Directo...
•
35:43

Avoiding the Ostrich Approach
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about ...
•
51:57

'We've Made Our Own Prison'
Insider threats are creating new attack vectors, but old-school solutions could rise to the challenge.Regardless of the situation or dynamic, everyone likes to think that they’re special. However, with experience we learn that a...
•
43:29

Dark AI Speeding Hacker Evolution
In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people?I recently sat down...
•
36:48

Why Ransomware, Credential Theft and Phishing Schemes Persist
One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends.The to...
•
40:32

Unsecure Webcam Was All a Ransomware Group Needed
Endpoint security tools worked, but the hackers worked harder for their payday.While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this o...
•
32:00

IABs, Dark Web Fueling Ransomware Surge
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to...
•
39:52

Manufacturing’s Internal Cyber Struggles
Breaking down silos while securing the cloud and leveraging secure-by-design advancements.The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarte...
•
27:55

Observations of an Ethical Hacking Researcher
One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats a...
•
36:13

The Evolution of OT Vulnerabilities
When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important...
•
37:25

The Legacy of AI in Cybersecurity
While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics.So, in continuing this trend, we...
•
27:23

A Happy Ending to the Latest ICS Hack
The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this ep...
•
30:02

The Biggest Hacks of 2024
Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecur...
•
41:11

Looking Back to Move Forward
As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months.While I’m grateful for everyone we’ve had on the show, and all the support we continue ...
•
42:39

AI Is Exposing Your Most Vulnerable Attack Surface
According to Fortinet’s 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percen...
•
35:55

Minimizing Hacks by Focusing on Uptime
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense lo...
•
39:45

What Cybersecurity Can Learn from Tom Brady
We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a ...
•
53:50

Threat Landscape Update
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks eman...
•
39:26

The Little Things That Kill
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.We know that the frequency of attacks will continue to increase.We know that it’s not if your ICS...
•
39:14

Phishing Attack Defense 'Not Rocket Science'
Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a ...
•
22:22

Legacy Mindsets Are Helping Hackers Weaponize Networks
So, my daughters like to give me a hard time about growing old. Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they wor...
•
43:20

Using Force Multipliers to Protect Against Next-Gen Stuxnet
While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings.SonicWall’s ...
•
40:53
