Artwork

Eric Sorensen에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Eric Sorensen 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

'There's No Bulletproof Vest' in Cybersecurity

53:06
 
공유
 

Manage episode 433187938 series 3352216
Eric Sorensen에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Eric Sorensen 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.
When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings.

I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to Security Breach. He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.

Watch/listen as Jeremiah shares his thoughts on:

  • The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can't measure the loss of trust.
  • Why the human factor will always be the weakest link.
  • How nearly every issue in cybersecurity comes back to visibility.
  • The new challenges AI will continue to create.
  • The increasing threat stemming from new credential harvesting schemes that clone login pages.
  • The unintentional backdoor vulnerabilities created by legacy systems.
  • Why he misses the Golden Age of Bug Bounties.
  • The value of placing time limits on access to sensitive data.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Everyday AI: Your daily guide to grown with Generative AI
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

챕터

1. 'There's No Bulletproof Vest' in Cybersecurity (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:17:34)

3. (Cont.) 'There's No Bulletproof Vest' in Cybersecurity (00:18:22)

121 에피소드

Artwork
icon공유
 
Manage episode 433187938 series 3352216
Eric Sorensen에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Eric Sorensen 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.
When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings.

I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to Security Breach. He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.

Watch/listen as Jeremiah shares his thoughts on:

  • The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can't measure the loss of trust.
  • Why the human factor will always be the weakest link.
  • How nearly every issue in cybersecurity comes back to visibility.
  • The new challenges AI will continue to create.
  • The increasing threat stemming from new credential harvesting schemes that clone login pages.
  • The unintentional backdoor vulnerabilities created by legacy systems.
  • Why he misses the Golden Age of Bug Bounties.
  • The value of placing time limits on access to sensitive data.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Everyday AI: Your daily guide to grown with Generative AI
Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

챕터

1. 'There's No Bulletproof Vest' in Cybersecurity (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:17:34)

3. (Cont.) 'There's No Bulletproof Vest' in Cybersecurity (00:18:22)

121 에피소드

Semua episode

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드