Breach offentlig
[search 0]
Mer
Download the App!
show episodes
 
Artwork

1
Security Breach

Eric Sorensen

Unsubscribe
Unsubscribe
Varje vecka
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
The Breach Report

Robert Wortmann, Rense Buijen

Unsubscribe
Unsubscribe
Dagligen+
 
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
  continue reading
 
Artwork

1
After the Breach Podcast

Jeff Friedman and Sara Shimazu

Unsubscribe
Unsubscribe
En gång i månaden
 
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
  continue reading
 
Artwork

1
Breachside Broadcast

Wyrd Miniatures, LLC

Unsubscribe
Unsubscribe
En gång i månaden+
 
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
  continue reading
 
Artwork

1
Zero Breach Zone

Andy Lombardo & Phil Hintz

Unsubscribe
Unsubscribe
En gång i månaden+
 
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

Unsubscribe
Unsubscribe
En gång i månaden
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Artwork

1
Breached

Breached Podcast

Unsubscribe
Unsubscribe
En gång i månaden
 
Each episode of Breached highlights a different issue that has been traditionally framed as an essential element of any American social contract. Over ten episodes, the podcast explores areas of American life where some sort of bargain between us – either explicit or implicit – no longer seems to stand.
  continue reading
 
Artwork

1
Breaching Extinction

Erica Wirth

Unsubscribe
Unsubscribe
En gång i månaden+
 
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
  continue reading
 
Artwork

1
Breach Your Mind

Bryan

Unsubscribe
Unsubscribe
En gång i månaden
 
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
  continue reading
 
Artwork

1
Repairers of the Breach

Ohadah Baht Ahveehzair

Unsubscribe
Unsubscribe
En gång i månaden
 
Truth centered audio series. Torah based. Every change that takes place on Earth impacts and shapes our very lives. Ohadah’s intention is to bring a conscious awareness to the fact that the world we live in, is in need of the Truth. The 21st century is compelling our generation to reverse the old trend and write a new story. Ohadah hopes to inspire the listener to reach for their highest potential to contribute a change. If one adapts righteous thoughts and habits, the Truth has the Power to ...
  continue reading
 
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
  continue reading
 
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
  continue reading
 
Artwork
 
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://podcasters.spotify.com/pod/show/intothebreach/support
  continue reading
 
Artwork

1
Hot Breach Podcast

by Get Flanked, Prodigio Pete & Rogue-9

Unsubscribe
Unsubscribe
Dagligen+
 
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
  continue reading
 
Artwork

1
Bad Breaches

Joi and Justin

Unsubscribe
Unsubscribe
En gång i månaden
 
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
  continue reading
 
Artwork

1
The Breach Report: Cybersecurity

FIT Cybersecurity

Unsubscribe
Unsubscribe
En gång i månaden
 
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
  continue reading
 
Artwork

1
Tom McCartan's Breach Of Etiquette

Sauropod: Podcasting the 21st Century

Unsubscribe
Unsubscribe
En gång i månaden
 
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
  continue reading
 
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
  continue reading
 
Artwork

1
Breaching The Walls

Eddie Perez

Unsubscribe
Unsubscribe
En gång i månaden
 
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
  continue reading
 
Artwork

1
Beyond the Breach

Illumio

Unsubscribe
Unsubscribe
En gång i månaden
 
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
  continue reading
 
Loading …
show series
 
Welcome to Episode 5 of Zero Breach Zone! In this episode, hosts Phil and Andy speak to the core of what this podcast is all about: making cybersecurity accessible and actionable for the entire education technology community. They share key insights from their recent cybersecurity and education technology conference experience at RTM. Phil and Andy…
  continue reading
 
Independent journalist Duncan Kinney of Progress Report was charged with mischief for allegedly spraypainting two monuments dedicated to Nazis and their collaborators—a charge he says the Edmonton Police have used to surveil and silence him. Kinney sits down with Desmond Cole to discuss his case. To donate to Kinney's legal fund: https://www.gofund…
  continue reading
 
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing …
  continue reading
 
After a fall hiatus while our co-hosts, Jeff and Sara, were busy on the water, the dynamic duo is back with Episode 33! Joining them is returning guest, Jared Towers, from Bay Cetology. Jared last visited to chat about the rescue of T51 “Roswell” and T49A2 “Jude” from Barnes Lake in Alaska on Episode 19 and he is back now to talk about more killer …
  continue reading
 
Incident Response - better safe than sorry! After so much good feedback on our first podcast episode, Rense and I tried to get the second episode done as soon as possible. As promised, we sat down and talked about common learnings from incident response cases we are working on. Enjoy the conversation: Which preparations are really useful Why you ca…
  continue reading
 
In part five of "Malifaux Burns," Misaki consolidates her power as Oyabun of the Ten Thunders, Kaeris fights for her life against Witchling Thralls, and Parker Barrows faces execution at the gallows. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat…
  continue reading
 
We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats. Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies. While table top exercises are nothing new, we’re goin…
  continue reading
 
Welcome to Episode 4 of the Zero Breach Zone! In this episode, we sit down with Oliver Page, CEO and founder of CyberNut, for an inspiring conversation about entrepreneurship and cybersecurity in education. Oliver shares his journey as a serial entrepreneur, including his experience founding NutKase, a successful K-12 device case manufacturer that …
  continue reading
 
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries res…
  continue reading
 
Tailored for security leaders, our on-demand webinar covers key topics that include: Top Priorities In Maintaining Compliance: Addressing compliance challenges in the ever-evolving cybersecurity landscape Evolving With AI: How industry leaders are leveraging AI to enhance their security measures. Adapting To New Risk Factors: How to adapt cybersecu…
  continue reading
 
Join our insightful webinar as we dive into the latest updates of NIST CSF 2.0. Gain a comprehensive understanding of its governance frameworks and discover key takeaways crucial for financial institutions. Topics we’ll cover include: Cybersecurity Defense Matrix: Explore strategic cybersecurity defense approaches, encompassing both proactive measu…
  continue reading
 
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the im…
  continue reading
 
Welcome to Episode 3 of Zero Breach Zone! In this episode, hosts Phil and Andy set the stage for what this podcast is all about: making cybersecurity accessible and actionable for the entire education technology community. Starting with the recent AT&T data breach as a springboard, our hosts demonstrate how cybersecurity vulnerabilities affect ever…
  continue reading
 
Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy. And based on Proofpoint’s 2024 State of Phish report, protecting against phishi…
  continue reading
 
In part four of "Malifaux Burns," the notorious outlaw Parker Barrows faces justice, Maxine Agassiz makes a startling discovery, and Governor General Marlow faces a world on fire. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (In…
  continue reading
 
So, my daughters like to give me a hard time about growing old. Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the production process …
  continue reading
 
Welcome to Episode 2 of Zero Breach Zone! In this episode, hosts Andy Lombardo and Phil Hintz recap the latest from the ISTE conference, where education and technology converge to shape the future of learning. We explore the major announcements, including the launch of EdTechIndex.org, a new resource for educators to find vetted educational apps th…
  continue reading
 
Everyone talks about the challenges in their relationships with others, but who’s going to make this relationship—the one with God—relevant? How often do we truly reflect on our intimate relationship with God? What does it look like, how do we nurture it, and is it grounded in reality or just superficial? In this discussion, Ohadah shares her perso…
  continue reading
 
While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings. SonicWall’s Mid-Year Cyber Threat Report found that their firewalls were under attack 125 percent of the time during a 40-hour w…
  continue reading
 
One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response. O…
  continue reading
 
Though it may seem difficult to stay righteous in a society filled with immorality, I am honored to encourage both youth and peers to pursue what is right. I've also come to realize that there are deliberate distractions in our world that hinder individuals from reaching their true righteous potential. In this discussion, we will explore 3 key dist…
  continue reading
 
Welcome to the debut episode of Zero Breach Zone! In this episode, hosts Andy Lombardo and Phil Hintz introduce the podcast, focused on the critical importance of cybersecurity in K-12 education. Drawing from their backgrounds in education and technology, they share their personal experiences with cyber attacks and discuss why striving for a “zero …
  continue reading
 
According to Veeam’s 2024 Ransomware Trends Report, cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of Security Breach guests have stated about trusting hackers after paying their extortion demands. Another finding shows that 63 percent of ransomware …
  continue reading
 
In part three of "Malifaux Burns," follow an intrepid reporter as she tries to gain access to a crime scene and an arcanist lieutenant as she infiltrates a secret lab. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)…
  continue reading
 
Welcome to the Zero Breach Zone—the podcast dedicated to fortifying K-12 schools against digital threats like breaches, phishing attacks, and everything in between. Join hosts Andy Lombardo and Phil Hintz for conversations and interviews with top experts in cybersecurity, education, and technology, as they share crucial insights and strategies to k…
  continue reading
 
The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production. However, these goals now nee…
  continue reading
 
Send us a text In this powerful episode, we dive into one of the most critical issues affecting our society today—domestic violence. With 18 years of experience in public safety, Bryan Shearouse shares his deeply personal encounters and insights into the impact domestic violence has on victims, families, and, particularly, children. Bryan discusses…
  continue reading
 
We’re back to discuss an all-too-familiar topic – ransomware. Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prev…
  continue reading
 
A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges. In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investments in cybersecurity. In working to mitigate potential DDoS attacks or malware drops, manufacturers are tapping into more…
  continue reading
 
Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 2020. Additionally, the cybersecurity firm found that 44 percent of computers used in manufacturing have bee…
  continue reading
 
I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II. Similarly, we can look at a number o…
  continue reading
 
Send us a text What happens when your gut instinct compels you to rush to a dangerous scene without a formal summon? Join us as we recount a gripping personal experience where I faced the unimaginable stress of a shots-fired call. From the nerve-wracking drive to the scene to the overwhelming relief of seeing my team safe, we explore the intense pr…
  continue reading
 
Join your hosts, Jeff Friedman and Sara Shimazu, along with returning guests Monika Wieland Shields from the Orca Behavior Institute and Michael Weiss from the Center for Whale Research as they dive back into demystifying killer whales. The topics range from T109A3A’s saga to Iberian orcas to Southern Resident killer whales being doofuses (per Mich…
  continue reading
 
Organizer Syed Hussan of the Migrant Workers Alliance for Change joins The Breach Show to talk about the uptick in immigrant bashing, the bipartisan project to exploit migrant labour, a Liberal backtrack on a historic plan to give status to undocumented people—and why anti-racism is the only way to stop all workers from getting divided and ruled.…
  continue reading
 
When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One of the highlights of this day was a softball game pitting the office versus the shop. The good-natured sh…
  continue reading
 
An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover. When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our …
  continue reading
 
Loading …

Snabbguide