POPULARITY
One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends.The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best information.One source that I look forward to each year is IBM's X-Force Threat Intelligence Index. It's full of all that stuff I just mentioned, but will special attention paid to the industrial sector. Unfortunately, some of that attention results from manufacturing being the most highly attacked industry for the fourth consecutive year. Also, according to the Index, it had the most ransomware incidents in 2024.But, as Chris Caridi, a Cyber Threat Analyst for the X-Force and our guest for today's episode shared with me, the news is not all bad. Watch/listen as we discuss:The rise in infostealer malware, credential harvesting and phishing attacks.The importance of understanding how to secure new technology before investing and implementing it.Why most cybersecurity issues are a human problem, not a technical problem.Why multi-factor authentication is now a must for OT connections.The misconfiguration errors that continue to plague manufacturing, and how they create a series of other cybersecurity problems.How manufacturing's cybersecurity journey is similar to the financial sector 10 years ago, and wAs a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Promoguy Talk PillsAgency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...Listen on: Apple Podcasts Spotify Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
In today's Fix of gaming news:Electronic Arts and DICE showed off some new gameplay from their next Battlefield game, this time highlighting the destructible environments. The game is still in its early phases, and there's no release date or even a title, but it looks to bring the series back to its multiplayer-focused roots with a fun solo campaign. In other news, Bethesda all but confirmed The Elder Scrolls IV: Oblivion remaster with a tweet announcing a livestream tomorrow, and an image of the roman numeral '4'. And finally, Fortnite is kicking off its latest Battle Pass with Darth Jar Jar.
Endpoint security tools worked, but the hackers worked harder for their payday.While everyone likes to know how someone else might have screwed up and what the fallout looks like, the more import elements of episodes like this one come from the in-depth conversations about new tactics and strategies that are being used by the bad guys, and simultaneously, the insight on new best practices for the good guys.So while I did enjoy diving into how the ransomware group Akira was able to use webcam access to infiltrate an organization, it was also great to discuss the evolution of these hacking groups, EDR tools, dark web monitoring and the need for better credential security with Steve Ross. He's the director of cybersecurity at S-RM, a leading provider or cyber intelligence and solutions.Watch/listen as we also discuss:Endpoint Detection and Response (EDR) tools.The rise of Akira, and the evolving symbiotic strategies used by this and other RaaS groups.Patching challenges.The growing need for dark web monitoring.The continued rise in login/credential harvesting.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Promoguy Talk PillsAgency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web communities, and more are fueling ransomware-as-a-service groups and posing new cybersecurity challenges. And while numerous reports detail the rise in ransomware attacks and the escalating amounts being paid in seeking a reprieve from denial of service, data extortion, and supply chain hacks, one recent finding really stood out. In their annual State of Ransomware Report, Blackfog stated that manufacturing had the highest number of undisclosed ransomware attacks, when compared to all other industries. So, as tough as we know the ransomware challenge is – it's actually a bit worse than we acknowledge because of the growing number of attacks that go unreported. Fortunately, we have an army of highly skilled individuals working to combat these threats. And that includes our guest for today's episode - Fortra's senior manager of domain and dark web monitoring solutions, Nick Oram. Watch/listen as we discuss:The surge of new ransomware tactics and groups, like RansomHub.The origins and continued growth of Initial Access Brokers (IABs) within the ransomware community.How affiliate programs are helping both RaaS and IAB groups increase their rate of successful attacks.Why dark web monitoring might be more important than ever for manufacturers.The ongoing "we adapt", "they adapt" dynamic.How to better educate the workforce and shift from a "As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Promoguy Talk PillsAgency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...Listen on: Apple Podcasts Spotify Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
Welcome to episode #213 of The COD Casuals, where we discuss all things Call of Duty, casual and professional!In this episode, we continue with the topic of CDL teams and their current standings, as we have another week of matches, and another eye opening round of games that have us wondering what is next for these teams. Along with this, we cover some news regarding the new Battlefield game in development, and if we feel it will be a strong rival to next year's COD. Finally, we close with some of our hopes with season 3, as there have been rumors of multiple new maps on the way, and the possibility of them coming to ranked play and the CDL. What are your thoughts on the Battlefield gameplay and news that we've seen so far? Are you going to be playing it, and will it compete with COD? Do you think any of the maps from season 3 will make it to ranked and the CDL, or will we see the same maps for the foreseeable future? Please let us know as we discuss this and much more! Hope you all enjoy the episode and we'll see you next week.Follow us:Twitter: @TheCODCasualsInstagram: @TheCODCasualsTikTok: @TheCODCasualsContact us:Business Inquiries: TheCODCasuals@gmail.com
Breaking down silos while securing the cloud and leveraging secure-by-design advancements.The challenges facing the industrial OT landscape that emanate from external sources are … varied, complex and constantly evolving. Smarter hacking groups, AI-driven phishing schemes and deceptive malware viruses head the list of concerns.And while these factors show no signs of fading, the reality is that there are just as many challenges facing industrial cybersecurity that are embedded within the very foundation of our operations. These legacy dynamics have created internal battles that absorb valuable resources, waste precious talent and help the bad guys stay a step ahead. With this in mind, we're going to tap into two key industry leaders to get their take on pressing, internal liabilities that are ensuring key production assets remain exposed. We'll hear from Silverfort's Rob Larsen, as he discusses the ongoing struggles created by IT/OT silos, as well secure-by-design initiatives. Mandiant's Paul Shaver will also offer his take on these silos, and how decisions related to cloud networking are impacting the security stature of key data, assets and network connections.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Promoguy Talk PillsAgency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
On this week's episode Matimi0 and LevelCap discuss the gameplay leaks from Battlefield Labs, Death Stranding 2, Fragpunk, and much more! Support us on Patreon for bonus content! https://patreon.com/LevelWithMePodcast Join Our Discord and make suggestions for our next episode topics https://discord.gg/hnj7eJSU Subscribe for new episodes every Wednesday and a LiveStream + QnA for Patreon members on Mondays 3PM PT.
David Keyes is the former spokesman to Israel's Prime Minister and pranker of dictators(00:38) What is ‘narrative warfare' and how do you fight back(02:21) From pranking dictators to advising the Israeli PM(05:07) David's wildest dictator pranks(09:20) Prepping Netanyahu to dodge media attacks(13:17) How startup founders can hit back at legacy media(17:26) Making the Israeli PM go viral on day one(21:14) Why are terrorists so damn good at PR?(23:21) The viral TOTAL VICTORY campaign and what made it explode(28:26) What David learned from working with Netanyahu firsthand(34:28) Our funeral for legacy media(36:08) Legacy media's death: self-inflicted?(37:28) What's next for PR agencies now that legacy media is kaput?(40:04) “We need to seize the memes of production” me to @PalmerLuckey(41:25) The secret sauce to making your content go viral everytime(43:58) Measuring who's winning the narrative war(46:04) Cracking world leaders with humors and jokes(49:46) How to stand out in an ocean of AI-generated slop(51:53) David's mentors and the lessons they taught him(55:34) I was dead WRONG about memes making millionsJason Levin is the founder of meme marketing software Memelord TechnologiesRead Jason's weekly advice column on organic social media growth for startups.Follow Jason on XFollow David on XSubscribe to Jason on YouTube.Past guests of The Jason Levin Show include: Eric Jorgenson, Greg Isenberg, Jack Raines, Paul Millerd, Mike Solana, Danny Miranda, Billy Oppenheimer, Jack Rhysider, Ben Wilson, and more.
One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors.And I can't think of anyone better to break down the hacker landscape than an individual whose research has led to being followed by well-known data breachers on social media and considered persona-non-grata in countries housing many of the most notorious state-sponsored hacking groups in the world. It's my pleasure to welcome Jeremiah Fowler back to Security Breach. You might remember that we originally spoke to him regarding a huge ERP data vulnerability last summer. As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Promoguy Talk PillsAgency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
When we talk about the threat landscape for the industrial sector, the eye-catching, headline-grabbing hacking groups with nefarious names typically lead the list of concerns. And while understanding their well-publicized exploits are important, what is often overlooked are all the little things these groups were able to do before dropping malware, shutting down networks, extorting ransoms, and stealing data.This is where taking the time to address those insecure connection points, update login credentials or patch zero and one-day vulnerabilities continue to be essential in the fight to safeguard operational technology and the industrial control system. But, the reasons these problems remain is that the solution is never as simple as it sounds. So, hopefully our collection of experts for this episode can help show you the way.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Promoguy Talk PillsAgency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
When truly great games are delivered, players tend to respond. The industry's newest sales success is the long-awaited Kingdom Come: Deliverance sequel, which immediately sold a million copies upon release. But it's hardly alone. And the rest of this long year is already shaping up to be something special, with Metal Gear Solid Delta's release date leaking, Death Stranding 2's newest trailer drawing nearer, and EA's Battlefield finally toying with a real comeback. Other news this week includes the potential of a discless PlayStation 6, the arrival of more Xbox games on PS5 in the form of Age of Empires and Age of Mythology, Capcom's announcement of a port of PS2's Onimusha 2 for PlayStation 4, and more. Let's then round things out with listener inquiries, as is our tradition. What are our thoughts on the return of games media brand Rooster Teeth? Is Sony putting its own games on sale too quickly and too steeply, to its own detriment? Did EA executives really claim Dragon Age: The Veilguard failed because it wasn't live service? Will Colin ever recover from tendinitis, or are his weightlifting days over? Please keep in mind that our timestamps are approximate, and will often be slightly off due to dynamic ad placement. Timestamps: 0:00:00 - Intro 0:23:28 - Side Quest is back! 0:29:11 - Colin's tendinitis 0:32:14 - George's bush 0:48:41 - Career switching advice 0:57:39 - Why is Abby tiny? 1:06:19 - Shawn Layden thinks PlayStation will keep physical for PS6 1:12:25 - Metal Gear Solid Delta release date leaked 1:17:31 - Death Stranding 2 is rated in South Korea 1:21:42 - KCD2 sells one million in one day 1:27:25 - New Battlefield game by early 2026 1:34:43 - MultiVersus is going offline 1:42:13 - Devil May Cry remake coming? 1:49:04 - Prince of Persia The Lost Crown sold 1.3 million copies 1:50:02 - Konami churned $500 million in profit over 9 months 1:51:06 - Sony integrates SN Systems 1:52:11 - What Are We Playing? 2:31:06 - Age of Mythology is coming to PS5 2:38:03 - Onimusha 2 is being remastered 2:46:00 - Rooster Teeth's return 2:57:37 - Should PlayStation stop putting their games on sale? 3:06:17 - Will Sony stop releasing on PC? 3:13:42 - Sony's live service push concerning for the industry? 3:16:28 - Is EA crazy? 3:23:38 - Is new IP overvalued? Learn more about your ad choices. Visit podcastchoices.com/adchoices
Send us a textJoin Chris and Richie for all the week's gaming news including all the updates from Warner Bros Games, Insomniacs pitch for Resistance 4 and Metal Gear Delta leaks.00:00:39 - Welcome/Housekeeping00:02:01 - What We're Playing00:14:36 - The News! 00:16:38 - Warner Bros Games (Batman & Wonder Woman)00:33:37 - Resistance 4 was pitched00:40:56 - Kingdom Come Deliverance 2 Reviews00:47:18 - Metal Gear Delta release date leaks00:50:24 - Capcom Spotlight00:52:53 - Age of Empires & Age of Mythology on PS500:57:44 - GamePass February00:59:38 - Football Manager 25 cancelled01:05:03 - Sumo Digital ditch New IP01:09:17 - New Battlefield incoming01:14:40 - Nintendo Switch Sales slump01:18:52 - This Day in Video Game History (Feb 7th)Want more gaming content?
Tonight's topics: - Rockstar says GTA 6 will release in Fall 2025 - Nintendo Switch 2 will be reasonably priced - Nintendo prepares for Switch 2 scalpers - Nintendo Switch sells 150 million units - EA CEO says Veilguard failed because it wasn't live service - Metal Gear Solid 3 Delta release date leaked - Capcom Spotlight rundown - Yoshida speaks again - New Battlefield revealed - Avowed director inadvertently hints at PS5 release Thanks as always to Shawn Daley for our intro and outro music. Follow him on Soundcloud: https://soundcloud.com/shawndaley Where to find Throwdown Show: Website: https://audioboom.com/channels/5030659 Twitch: https://www.twitch.tv/throwdownshow Twitter: https://twitter.com/ThrowdownShow YouTube: https://www.youtube.com/throwdownshow Discord: https://discord.gg/fdBXWHT Twitter list: https://twitter.com/i/lists/1027719155800317953
We try to decide if Xbox is now third-party, first details on the next Battlefield, weed and video games, The First Berserker: Khazan, PlayStation finally figures out PC, MultiVersus RIP, and much more!
Hit with a ton of Battlefield info today including Battlefield labs.. a glimpse at early footage of Battlefield 7, Battlefield Studios is announced, EA is doubling down on Battlefield with Vince Zampella in charge. Kingdom Come Deliverance 2 receiving high praise Forza Horizon 5 more thoughts Thanks everyone for watching our content.. for more info follow on X at @FunSpecluation Join our Discord!! https://discord.gg/qGq8wkhVJg affiliate links: Restream 2.0 is here! https://try.restream.io/studio-Fun Check out the Mupoer Rechargables here! https://mupoer.com/FUNSPECULATION Fun Speculation Merch here! https://my-store-11567836.creator-spring.com/ Channel Membership link here! https://www.youtube.com/channel/UCQAcuLpUYsuNltjRkrAGQkQ/join Music all created by Judzilla Music https://twitter.com/JudzillaUK https://www.youtube.com/@JudzillaMusic Pong Soul also on www.youtube.com/@LivingSplitScreen @PongSoul on X 3Bit https://www.youtube.com/@PixEcho/featured @ithreebit on x Jasper also on www.youtube.com/c/LoreMasterJasper @LoreJasper on x Fuzzy Belvedere also on www.youtube.com/FuzzyBelvedere @Fuzzy_Belvedere on x Kaitlin also on www.tiktok.com/@kaitlin_fancy @Kaitlinx0615 on x Psychonauts @Psychonauts8 on X GamePassDad https://www.youtube.com/gamepassdad @gamepassdad on x
First Class. Learn more about your ad choices. Visit podcastchoices.com/adchoices
While we're still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we're talking about cybersecurity or … other social topics.So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to industrial cybersecurity efforts – Artificial Intelligence. First, we'll hear from Mandiant's Paul Shaver as he discusses the legacy dynamics of industrial cybersecurity, including ongoing obstacles associated with inventory, visibility and segmentation strategies – and the impact AI could have on all of them. Then we'll transition to HackerOne's Will Kapcio for his take on AI and the ongoing evolution of cybersecurity tools. We'll wrap up with instructor and the author of the Hack is Back as he discusses what drove his desire to write the book, the impact AI is having on the next generation of cybersecurity specialists, and the evolving vulnerabilities they can expect to face.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
On this week's episode Matimi0 and LevelCap discuss new info about the next Battlefield game, the death of Live Service games, Severance, and much more! Support us on Patreon for bonus content! https://patreon.com/LevelWithMePodcast Join Our Discord and make suggestions for our next episode topics https://discord.gg/hnj7eJSU Subscribe for new episodes every Wednesday and a LiveStream + QnA for Patreon members on Mondays 3PM PT.
The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.We talk a lot about change on Security Breach. Some of it's good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detected by Noam Moshe and Claroty's Team82. The malware is described as a custom-built IoT/OT strand created by the Iran-based hacktivist group, the CyberAv3ngers. The malware targeted OT/IoT devices in Israel and the U.S. Moshe's team detected the malware being used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs and firewalls. Typically, this is the part of the story that takes us down a dark and frustrating road, but as you'll hear, that's not necessarily the case this time.For more information on Team82's findings on IOCONTROL, click here.Also, just a bit of housekeeping – we're switching the frequency of Security Breach from weekly to bi-weekly. This change will allow me to spend more time on each episode, which will translate to greater depth and expanded coverage on all the pressing topics of industrial cybersecurity. And remember, this is your podcast – let me know your thoughts and feelings on the change and anything else you'd like to see on the show.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.” His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024's mistakes in 2025, we're going to take a look at some of the industrial sector's biggest exploits, and offer solutions and strategies in our ever-raging combat with the Black Hats. Watch/listen as we cover:A unique supply chain hack that came up during our conversation with Theo Zafirakos, a Cyber Risk and Information Security Expert at Fortra.The fall of 2024 brought security compromises to the front door of a number of prominent industrial enterprises, including Halliburton.In early August millions were impacted when National Public Data, a major data broker that performs background checks, reported that 2.9 billion personal records from over a million individuals in the U.S., the U.K. and Canada were accessed.Ford Motor Company was also a target, with a data breach that saw hacking groups steal 44,000 records containing personal and product information.Anna Wells, executive editor of Manufacturing.net and Manufacturing Business Technology, brought us coverage of a hack that has crippled a global beverage maker.We close out with a story from early this year describing how some of the basic tools found throughout a manufacturing plant can become pathways for the innovative hacker.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
This week Mike hosts Richard Heydarian, Senior Lecturer at the University of the Philippines Asian Center and author of, among others, Asia's New Battlefield (2015, Bloomsbury) & The Indo-Pacific: Trump, China & The New Struggle for Global Mastery (2019, Palgrave), to discuss the Philippines' foreign policy, relationships, and strategy in the Indo-Pacific.
As we begin to close out 2024 and look ahead to 2025, I couldn't resist the urge to revisit some of my favorite guests from the last couple of months.While I'm grateful for everyone we've had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with special focus being given to a handful of the most critical issues confronting our OT environments. First, we hear from Jon Taylor (1:16) at Versa, as he discusses a unique approach to patching and secure-by-design strategies that involve the development embedded micro-segmentation approaches. Next, we'll hear from Cloud Range's Tom Marsland (11:18) as he discusses the continued challenges presented by data silos, and innovative ways to address the shortage of cybersecurity specialists. Then we'll turn to Baker Tilly's Jeff Krull (19:42) as he reports on ransomware gangs and their combination of new and old tactics. And we'll finish up with cybersecurity researcher Jeremiah Fowler (29:40) as he discusses some of the ongoing challenges about addressing persistent vulnerabilities.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
According to Fortinet's 2024 State of Operational Technology and Cybersecurity Report, 43 percent of those surveyed reported a loss of business critical data or intellectual property so far in 2024– a number this is up nearly 10 percent from last year. And we all know what happens with this hijacked data. Per the World Economic Forum's May 2024 white paper, the number of ransomware attacks on industrial infrastructure doubled in 2023, boosting ransomware to the leading concern for manufacturers, with 40 percent citing it as their top issue. While that may not surprise you, this might - due to the many challenges we've discussed here on Security Breach, the industrial sector now accounts for 71 percent of all ransomware attacks. Our data is valuable and the hackers know it.To offer some perspective on protecting this data, we sat down with Karthik Krishnan, CEO of Concentric.ai – a leading provider of data security posture management solutions. Watch/listen as he provides insight on:Prioritizing and limiting data access to lessen the blast radius.How data, especially customer data, is essentially the "new oil."Reversing your mindset to think about "data out" instead of "user in".The generative AI advancements that continue to be made, and how they're producing more complex phishing and ransomware attacks. Why it has become easier for hackers to get a foothold on your network.The best ways to shore up your weakest security link - employees.How it all starts with data discovery and visualization, then prioritization.A look at the money involved with remediation and response costs versus proper planning and defense prep.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings. Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality. In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.The need for SOPs that make it easier to assimilate cybersecurity into OT processes.Ways to more safely update the growing number of devices on the plant floor.Protecting IP and, more specifically, the software coding associated with it.The impact AI continues to have on increasing the sophistication of hacking attempts.Why all hacks are "highly preventable."The role of quantum computing and the steps to take in preparing for "Q Day".As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.Today's episode is going to take on a little different flavor, as we're going to show you one particular tool that can impact a number of your security planning, training and discovery strategies.While table top exercises are nothing new, we're going to demonstrate how they're evolving and can be customized according to your needs. We're going to tackle the human element of cybersecurity by discussing communications strategies, and we'll offer some insight on getting greater buy-in from throughout the organization, including the C-suite and those controlling the purse strings.Joining me to discuss these topics and run through a mock exercise will be:Navroop Mitter, the CEO and founder of ArmorText. His firm is a leader in secure out-of-band communications.Matthew Welling, a partner at Crowell & Moring's Washington, D.C. office, where he works in the firm's Privacy & Cybersecurity Group.Timothy Chase, the director of the Manufacturing ISAC, a non-profit organization and leading provider of threat intelligence sharing solutions.In addition to the table top exercise, we'll discuss:Communication challenges before, during and after an attack.Response strategies and the evolving dynamic of out-of-band communications.The ongoing challenges of addressing the Human Element of cybersecurity.The impact of regulatory efforts and how they're playing a bigger role in attack response plans.The types of tools or solutions that can play the biggest role in helping organizations respond to attacks more effectively.How to control the emotional responses that will undoubtedly emanate from an attack. As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Everyday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we're going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries responsible for next-generation malware, ransomware and phishing schemes. To kick things off, we'll hear from:Tom Marsland, VP of Technology for Cloud Range as he discusses threats to our infrastructure and state-sponsored groups from China.(3:31) He'll be followed by Cyberhoot's Craig Taylor as he updates us on phishing schemes.(5:45) And then we'll hear from Jon Taylor at Versa Networks as he talks about strategies bad actors are taking in targeting legacy industrial control systems. While many of those topics are already at the top of our list of concerns, there are also a number of evolving threats that warrant an uptick in resources – from both a financial and skillset development perspective. We'll dive into comments from:(9:26) Corsha's Anusha Iyer as she discusses supply chain and dwelling attacks.(15:33) Venafi's Kevin Bocek and his take on embedded software vulnerabilities and how hackers are taking advantage of them.(22:18) Baker Tilly's Jeff Krull offers an update on the evolving complexity of ransomware groups and how they're targeting the industrial sector.(25:20) And finally, let's wrap up with one of my favorite guests we've ever had on Security Breach – researcher Jeremiah Fowler. He'll offer some insight on a number of unique, embedded threats and some of the lessons he's learned in tangling with state-sponsored Russian hackers.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
The Battlefield Show - The Premiere Battlefield 2042 Podcast
Sage and Sammy go over all the things the new Battlefield game needs to have. ───────── ➤ Twitter: https://twitter.com/UplinkPodcast Catch up with us on our socials! We would love to hear what you have to say! ➤ Discord: https://www.discord.gg/qNBxYsK ➤ Sammy: https://www.youtube.com/channel/UCfrvWp0LzoUvArbBh7YI30Q ───────── We would highly appreciate any constructive feedback or review from you! Let us know in the comment section below, or on any of our socials! Our listeners are our priority, so we want to make the best content we possibly can! Please consider sharing the podcast with your family, friends, and followers. It would be highly appreciated! ❤️ See you later video gamers! ───────── For any business inquiries, please email us at: contact@uplinkpodcast.com
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true.We know that the frequency of attacks will continue to increase.We know that it's not if your ICS will be probed, but when.And we also know that asset and connection visibility is an ongoing challenge due to the implementation of more automated technology.Finally, we also know that one of the most important aspects of any cybersecurity plan is the portion that lays out the response. One of the most effective ways to address these concerns can be the use of attack simulations. In this episode we tap in to the expertise of Tom Marsland, VP of Technology for Cloud Range, a leading provider of live-fire cybersecurity exercises and training. Watch/listen as we discuss:All the little things that are continuing to pose challenges to industrial cybersecurity.Why state-sponsored hacker groups in China are getting more of his attention lately.Why successful incident response is about the people, not the tools.The importance of "training like you fight."His role with VetSec, and the role it can play in filling cybersecurity talent gaps. How to bring IT and OT together and why the onus on strengthening these bonds might fall more on IT.Why the culture of security needs to permeate throughout the entire organization.How AI can help make the most of your people.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
Maybe you're sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that's the case, then you've made a lot of hackers very happy.And based on Proofpoint's 2024 State of Phish report, protecting against phishing schemes is simply not being reinforced or given the proper priority. For example,71% of surveyed users admitted to taking a risky action, and 96% knew they were doing something risky when interacting with email or text messages.85% of security professionals said that most employees know they are responsible for security, but 59% of employees weren't sure or claimed that they're not responsible.Furthermore, 24% admitted to responding to emails or text messages from someone they don't know, and 19% clicked on links in emails from people they don't know.Finally, 73% of surveyed companies reported a business email compromise, but only 29% are actively teaching users about BEC attacks. To address these and other phishing attack dynamics, I sat down with Craig Taylor, co-founder of Cyberhoot, a leading provider of phishing prevention solutions. Watch/listen as we discuss:How hackers are going after session tokens to steal valuable credential data.Why phishing prevention training spends too much time on avoiding the click instead of positive reinforcement of proper actions.The need for worker training to go beyond any impact to the company, to the individual cyber risks as well.How adding "friction" to email could be a solution.The bad password advice that many high-level organizations continue to distribute.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
In our latest episode we talk about the newest details revealed about the next Battlefield title. Thanks for listening!! Learn more about your ad choices. Visit podcastchoices.com/adchoices
ExtremePCUK - A monthly show about PC Gaming, Building, Modding and Reviews.
AMD FSR 4 to use full AI, how will this work?; Switch 2 we have the latest news; Two Point Museum, coming soon, we tell you all about it; God of War Ragnarök finally hits PC; New Battlefield game, details revealed; Nintendo actually suing Palworld; the EGP Game Quiz and much more! Join our Discord: https://discord.gg/extremegamingpodcast Look for us on Spotify and all good podcast services. #podcast #gaming #technology #gamereview #viral
This week On Active Reload the boys talk about the NEW battlefield announcement and their experience with recent BF titles. What would Nintendo have to do in order for James and Grant to buy a Switch 2? And the Madden Curse is BACK! plus Notable games releasing this week adn the games the boys are playing!
Israel put its faith in building a small, Star Wars style, technological army. But that army was defeated on Oct. 7, by a Mad Max ragtag band of terrorists. Mike and Gadi discuss the failure of the IDF to adapt to this new Mad Max world. But in light of President Biden's threat to withhold weapons, Israel must not only change its military thinking, it also has to reform its war economics if it is to achieve what Mike and Can Kasapoglu call in a new piece in Tablet, "operational sovereignty." Also in this episode: has Joe Biden taken his anti-Israeli policy one step too far?
#Drones: The new battlefield. Henry Sokolski, NPEC https://www.nytimes.com/2024/05/09/world/europe/ukraine-strikes-russia-oil-refineries.html?smid=nytcore-ios-share&referringSource=articleShare 1903 Gettysburgh
Donald Trump makes bond in New York City. Joe Biden introduces the Oyster Bunnies! The Biden White House is mad at those who are mad about Easter being co-opted by "Transgender Day of Visibility." The United States might be about to run out of bombs. The FBI has abused the Fourth Amendment more than 278,000 times? Squatters now have more rights than American citizens. Woke Disney strikes again! Diplomatic blackmail: The president of Mexico wants $20 billion just to talk with Biden. Guest Lara Logan discusses the new information around the destruction of the Francis Scott Key Bridge. Learn more about your ad choices. Visit megaphone.fm/adchoices
This week, we talk about Detroit Lions, Letterkenny, Picard, Strange New Worlds, new Battlefield game in 2025, Channing Tatum producing The Maxx movie, Disney's HoloTile floor, Domino's, Little Caesar's Big! Big! Bucket of spaghetti, SUATMM Juggernaut vinyl figure, the QoftheW, and more! Salty Merch: https://www.teepublic.com/user/saltylanguagepods Our Patreon: Patreon.com/saltylanguage Subscribe / rate / review us on Apple Podcasts! Links: 1. Channing Tatum to produce The Maxx movie https://bleedingcool.com/tv/the-maxx-channing-tatum-cant-wait-to-adapt-sam-kieth-creation/ 2. Disney HoloTile floor https://www.ign.com/articles/disney-unveils-the-holotile-floor-inching-us-closer-to-a-real-life-holodeck 3. Stanley cups contain lead https://www.cnn.com/2024/01/26/health/stanley-cups-lead-wellness/index.html 4. New Battlefield game not until at least 2025 https://insider-gaming.com/new-battlefield-game-may-not-launch-until-at-least-2025/ 5. Ultra Pro Wrestling https://twitter.com/upwvideogame/status/1721861946205511896 6. Little Caesar's Big! Big! Bucket of spaghetti https://itsthebageler.com/2022/05/01/little-caesars-big-big-bucket-my-part-in-their-downfall/ SUATMM: Juggernaut vinyl figure https://mondoshop.com/products/juggernaut-soft-vinyl-figure-timed-edition QoftheW: What's something from your childhood you miss doing now you're an adult? Insult: Shitbag Visit us at: saltylanguage.com Apple Podcasts: https://podcasts.apple.com/us/podcast/salty-language/id454587072?mt=2 Spotify: https://open.spotify.com/show/3GnINOQglJq1jedh36ZjGC iHeart Radio: http://www.iheart.com/show/263-Salty-Language/ Google Play Music: https://play.google.com/music/listen#/ps/Ixozhhniffkdkgfp33brnqolvte Tony's YouTube channel: https://www.youtube.com/@allthebeers Bryan's YouTube channel: https://www.youtube.com/@IFinallyPlayed https://www.tiktok.com/@saltylanguage facebook.com/saltylanguage @salty_language / saltylanguage@gmail.com http://salty.libsyn.com/webpage / http://www.youtube.com/user/SaltyLanguagePod Instagram/Threads: SaltyLanguage Reddit: r/saltylanguage Stitcher: https://www.stitcher.com/podcast/salty-language tangentboundnetwork.com Share with your friends!
Alex W. Palmer, contributing writer, New York Times Magazine, joins John to talk about his piece, “Act of War: Inside America's Silicon Blockade Against China.”
The Supreme Court's decision in Roe v. Wade transformed the landscape of abortion rights overnight. For the doctors, lawyers, feminists, and others who had fought for nationwide legalization, Roe was the end of a long battle. But for the growing movement against abortion rights, it was the beginning of a new battle: to protect the fetus, challenge abortion providers, and ultimately overturn Roe. This is the story of how opponents of abortion rights banded together, built power, and launched one of the most successful grassroots campaigns of the past century.
“Is it 10 billion or 13 billion, in the United States alone, that was employed in this—what else can you call it—psyops campaign?… The government felt that it was acceptable to deploy these military-grade technologies against all of us to coerce, compel, and mandate that we accept an unlicensed product that turns out to not be safe nor effective,” says mRNA vaccine pioneer Dr. Robert Malone, author of the new book, “Lies My Gov't Told Me: And the Better Future Coming.”In this episode, we dive into the Twitter Files, information warfare, psychological operations, and how we can make sense of the bewildering series of events we've witnessed in the last three years.“We're now seeing the documentation on a daily basis released to us by Twitter of this intense collusion between the US government, tech, and corporate media,” says Dr. Malone.Some describe it as fifth-generation warfare, “or fifth-generation warfare gradient is a better way to think about it,” says Dr. Malone. “This new battleground in which your mind and your thoughts, your very emotions are the battleground. It is not about territory. It's about what you believe. It's what you think.”
The Supreme Court's decision in Roe v. Wade transformed the landscape of abortion rights overnight. For the doctors, lawyers, feminists, and others who had fought for nationwide legalization, Roe was the end of a long battle. But for the growing movement against abortion rights, it was the beginning of a new battle: to protect the fetus, challenge abortion providers, and ultimately overturn Roe. This is the story of how opponents of abortion rights banded together, built power, and launched one of the most successful grassroots campaigns of the past century.