Breach ציבורי
[search 0]
עוד
Download the App!
show episodes
 
Artwork
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
  continue reading
 
Artwork

1
After the Breach Podcast

Jeff Friedman and Sara Shimazu

Unsubscribe
Unsubscribe
חודשי
 
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
  continue reading
 
Artwork

1
Breachside Broadcast

Wyrd Miniatures, LLC

Unsubscribe
Unsubscribe
חודשי+
 
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
  continue reading
 
Artwork

1
Breached

Breached Podcast

Unsubscribe
Unsubscribe
חודשי
 
Each episode of Breached highlights a different issue that has been traditionally framed as an essential element of any American social contract. Over ten episodes, the podcast explores areas of American life where some sort of bargain between us – either explicit or implicit – no longer seems to stand.
  continue reading
 
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
  continue reading
 
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
  continue reading
 
Artwork
 
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://podcasters.spotify.com/pod/show/intothebreach/support
  continue reading
 
Artwork

1
The Breach Files

Scott Harris

Unsubscribe
Unsubscribe
יומי+
 
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
  continue reading
 
Artwork

1
Hot Breach Podcast

by Get Flanked, Prodigio Pete & Rogue-9

Unsubscribe
Unsubscribe
יומי+
 
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
  continue reading
 
Artwork

1
Bad Breaches

Joi and Justin

Unsubscribe
Unsubscribe
חודשי
 
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
  continue reading
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Artwork

1
Tom McCartan's Breach Of Etiquette

Sauropod: Podcasting the 21st Century

Unsubscribe
Unsubscribe
חודשי
 
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
  continue reading
 
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
  continue reading
 
Artwork
 
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

Unsubscribe
Unsubscribe
חודשי
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Artwork

1
Repairers of the Breach

Ohadah Baht Ahveehzair

Unsubscribe
Unsubscribe
חודשי
 
Truth centered audio series. Torah based. Every change that takes place on Earth impacts and shapes our very lives. Ohadah’s intention is to bring a conscious awareness to the fact that the world we live in, is in need of the Truth. The 21st century is compelling our generation to reverse the old trend and write a new story. Ohadah hopes to inspire the listener to reach for their highest potential to contribute a change. If one adapts righteous thoughts and habits, the Truth has the Power to ...
  continue reading
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
  continue reading
 
Loading …
show series
 
Tenant rights organizer Chiara Padovani joins The Breach Show to discuss how a Canadian mega landlord is using algorithmic software as it massively hikes rents. The software maker is being sued by the U.S. government for allegedly enabling landlords to collude to artificially inflate rental prices.
  continue reading
 
Send us a text A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges. In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investments in cybersecurity. In working to mitigate potential DDoS attacks or malware drops, manufacturers are ta…
  continue reading
 
Send us a Text Message. What happens when your gut instinct compels you to rush to a dangerous scene without a formal summon? Join us as we recount a gripping personal experience where I faced the unimaginable stress of a shots-fired call. From the nerve-wracking drive to the scene to the overwhelming relief of seeing my team safe, we explore the i…
  continue reading
 
Join your hosts, Jeff Friedman and Sara Shimazu, along with returning guests Monika Wieland Shields from the Orca Behavior Institute and Michael Weiss from the Center for Whale Research as they dive back into demystifying killer whales. The topics range from T109A3A’s saga to Iberian orcas to Southern Resident killer whales being doofuses (per Mich…
  continue reading
 
In part two of "Malifaux Burns," we catch up with English Ivan, Kiya, Reva, and the Governor General himself. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)על ידי Wyrd Miniatures, LLC
  continue reading
 
Send us a text Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 2020. Additionally, the cybersecurity firm found that 44 percent of computers used in manufac…
  continue reading
 
Send us a text I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II. Similarly, we can loo…
  continue reading
 
Organizer Syed Hussan of the Migrant Workers Alliance for Change joins The Breach Show to talk about the uptick in immigrant bashing, the bipartisan project to exploit migrant labour, a Liberal backtrack on a historic plan to give status to undocumented people—and why anti-racism is the only way to stop all workers from getting divided and ruled.…
  continue reading
 
Send us a text When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One of the highlights of this day was a softball game pitting the office versus the shop. The …
  continue reading
 
Send us a text An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover. When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us fr…
  continue reading
 
Send us a text The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we continue to produce Security Breach, and, by the way, continue to be so appreciative of the growth and support we’ve received from each of …
  continue reading
 
In part one of "Malifaux Burns," the one-eyed gigant Euripides brings a warning to Queen Titania. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)על ידי Wyrd Miniatures, LLC
  continue reading
 
Send us a text According to IBM’s Cost of a Data Breach Report, nearly 20 percent of the organizations surveyed stated that they have experienced a breach stemming from a compromise in their supply chain, or a vulnerability related to it. The average cost of these breaches was estimated at just under $4.5 million. Their data also found that attacks…
  continue reading
 
Send us a text Due to the rise in attacks on manufacturing and critical infrastructure, and the devasting impacts these attacks have on daily lives around the world, the World Economic Form recently unveiled a report entitled Building a Culture of Cyber Resilience in Manufacturing. This initiative not only identified the sector’s primary challenges…
  continue reading
 
Send us a text When looking at industrial cybersecurity, more attention is being paid to how workers are logging in to access critical machinery, software or data. And according to Trustwave Threat Intelligence’s recent Manufacturing Threat Landscape report, 45 percent of attacks experienced by manufacturers stemmed from the bad guys accessing cred…
  continue reading
 
Episode Description: In part two of "Nothing Is Forever," Jedza, Mikhail, Cornelius, and Bernadette descend into a long abandoned mine shaft in search of a mysterious artifact. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Int…
  continue reading
 
On Episode 31 Jeff and Sara catch up on the most recent sightings in the Salish Sea and which whales have been seen lately. It’s been a hectic few weeks and they had recorded this previously and then there was just so much more happening that they had to record it again. And it’s a good thing too — they both sit down to record after a crazy day on …
  continue reading
 
Send us a Text Message. Ever felt the sting of self-doubt while pursuing personal growth? Join me as I confront my own insecurities in real-time, choosing to publish rather than delete a vulnerable video of my day off. This decision embodies the spirit of facing challenges head-on and showcases the raw, unedited moments that make personal developme…
  continue reading
 
Send us a text As we’ve discussed numerous times on Security Breach, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space. Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vulnerabilit…
  continue reading
 
Send us a text Over the last nearly 100 episodes of Security Breach we’ve discussed a wide range of strategies for protecting the manufacturing enterprise. But perhaps the most polarizing of these has been Zero Trust. While some unwaveringly champion the cause of this approach, others question the ways in which it is typically deployed. Perhaps thi…
  continue reading
 
Send us a Text Message. Ever felt the sting of self-doubt while pursuing personal growth? Join me as I confront my own insecurities in real-time, choosing to publish rather than delete a vulnerable video of my day off. This decision embodies the spirit of facing challenges head-on and showcases the raw, unedited moments that make personal developme…
  continue reading
 
Episode 30 of After the Breach brings to the table a conversation we often have off the air. Joining us are Michael Weiss from the Center for Whale Research and Monika Wieland Shields from Orca Behavior Institute. Throughout our discussion we try to “demystify” killer whales. Being around these amazing animals sometimes has us seeing them through a…
  continue reading
 
Send us a text One of the more common obstacles that we discuss here on Security Breach is how increased connectivity has combined with new Industry 4.0 technologies to constantly expand the OT attack surface. In the midst of all this expansion, it’s easy to either overlook cybersecurity concerns, or put too much trust in the embedded security feat…
  continue reading
 
In part one of "Nothing Is Forever," Jedza and Mikhail visit Zoraida in search of a favor. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)על ידי Wyrd Miniatures, LLC
  continue reading
 
Send us a text Those of you with a military or law enforcement connection are probably, and unfortunately, familiar with the term collateral damage. While this phrase has a legacy in these environments, it’s also become an unwelcome addition to the realm of cybersecurity. Examples of this dynamic can be found in a number of hacktivist attacks that …
  continue reading
 
Send us a Text Message. Ever wondered how a simple walk around the lake can turn a rough day into a refreshing experience? Join me as I share a personal story of battling through a relentless headache by staying active, only to find unexpected joy and novelty in everyday moments. You'll hear a hilarious tale about a new recruit's first encounter wi…
  continue reading
 
On Episode 29 co-hosts, Jeff and Sara, welcome Judith Scott to the show. Judith has been around the world watching whales and spends much of her year in Iceland with the killer whales of the North Atlantic. She gives an introduction to the killer whales they see regularly off of Iceland and shares some stories about those whales. These killer whale…
  continue reading
 
Send us a text Viewing hacks as diseases to address evolving threats, vulnerabilities and tools like AI. Like many of you, I recently dove into Verizon’s 2024 Data Breach Investigations Report (DBIR). And while there’s a plethora of data housed in the report that could fuel conversations on a multitude of topics, I chose the following two pieces of…
  continue reading
 
Send us a Text Message. Ever set out for a simple morning walk only to find yourself deep in reflection about the curiosities of life? That's exactly what unfolded during my serene stroll around a southeast Georgia lake, and I've brought the entire experience to your ears. Lacing up for a five-mile trek, I muse on the underrated connection between …
  continue reading
 
Send us a text It starts with a dedication to enhanced visibility. One of the big conversations regarding OT security revolves around the use of tools. Some have too many, others not enough and everyone is searching for the funds to mange and obtain the right ones for a constantly evolving threat landscape. The key to understanding which tools are …
  continue reading
 
Send us a text Many attacks on manufacturers are just the first step in going after even bigger targets. One of the inescapable truths about the industrial sector is that it is usually the ultimate proving ground for product performance. When we look at some of the technologies that have created seismic social shifts, tools like operational softwar…
  continue reading
 
In part two of "Uncharted Waters," the crew of the Exploration Vessel Superior encounter a creature unlike anything they have seen before. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)…
  continue reading
 
Send us a text In this episode, we dive into some of the most notorious attacks to hit manufacturing over the last six months. In addition to speaking with cybersecurity experts from around the world for this podcast, I’ve also been able to do a fair amount of reporting on our websites regarding several high-profile industrial attacks. So, I felt l…
  continue reading
 
On Episode 28 of After the Breach co-hosts Jeff and Sara dive into Steller’s sea lion hunts, recent sightings, and some good news surrounding T109A3A. This spring has been one that has been filled with a lot of sea lion hunts. And for many of these hunts the whales involved have been, or included, the T049As. Jeff and Sara discuss what it’s like to…
  continue reading
 
Canadian doctors Yipeng Ge and Ben Thomson join The Breach’s Brishti Basu to discuss what they witnessed during humanitarian trips to Gaza. Soon after returning, they got surprise emails: international lawyers wanted their testimony to build a war crimes case against Israel. Meet the Canadian doctors testifying against Israel…
  continue reading
 
Send us a text A look back at Security Breach guest's most accurate and timely industrial cybersecurity predictions. As we near our 100th episode of Security Beach, I thought it would be a good time to take a look back at some of our guest’s predictions from the previous 12 months. If you want to check out the full episodes from any of these previo…
  continue reading
 
As I go through memories and old voice notes I left for myself I came across a good one that I recorded in January of 2023. This is when my life took me on a journey I had to prepare for at 22 years young. I traveled by myself and was away from home for almost a year. During this time I got to see people for who they were and observe the influences…
  continue reading
 
Send us a text The new factors impacting a growing attack surface, and how to evolve your cyber risk strategies. The origins of what we talk about here on Security Breach can go back to any number of transformational events, but the reality is that all of them contributed an individual component to the unique mosaic that is the legacy of industrial…
  continue reading
 
Send us a text How a greater focus on new and legacy OT connections could alter the cybersecurity battlefield. Everything old … is new again. While that might seem like a natural lead-in for discussing hacker tactics, that same mantra rings true when discussing OT technology. Mordor Intelligence recently reported that U.S. manufacturing spent over …
  continue reading
 
On Episode 27 of After the Breach podcast co-hosts Jeff and Sara share all about the most recent sightings from the Salish Sea. It has been a busy few weeks whale-wise and the duo felt they needed to catch up about it almost as soon as they had finished recording the previous episode! Dive in with them as they talk about the families that have been…
  continue reading
 
In part one of "Uncharted Waters," Maxine Agassiz and her crew set out aboard the Exploration Vessel Superior to unravel the nautical mysteries created by the arrival of the Burning Man. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth C…
  continue reading
 
Send us a text The good, the bad and the ugly of mobile device security in the expanding OT attack landscape. Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to a recent report from Imp…
  continue reading
 
Send us a text It's not always about the ransom, data theft or denial of service. Many cheered with the recent crackdowns on groups like LockBit, and rightfully so. However, the harsh reality is that most of these victories are short-lived. For example, after law enforcement seized control of multiple LockBit websites and stolen data, the group was…
  continue reading
 
Loading …

מדריך עזר מהיר