Przejdź do trybu offline z Player FM !
The Hacker's Most Lucrative Attack
Manage episode 401339207 series 3352216
The tech that's helping social engineers expand current exploits, including credential harvesting.
In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including:
- The double-edged sword of credential harvesting hacks.
- How data theft is providing greater visibility of an organization's supply chain and partners in helping cybercriminals accumulate more potential targets.
- The challenges of implementing and sustaining data hygiene practices.
- Using AI to to fill cybersecurity jobs.
- How new technology, like AI, is helping cybercriminals lower their operating costs.
- Understanding that you can't defend what you don't know or understand about your internal landscape.
- Embracing the benefits of IIoT, but understanding the security risks it carries.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
93 odcinków
Manage episode 401339207 series 3352216
The tech that's helping social engineers expand current exploits, including credential harvesting.
In this episode, we welcome Kory Daniels, CISO of Trustwave, a leading provider of industrial cyber risk solutions, to the show. The conversation spanned a number of topics, including:
- The double-edged sword of credential harvesting hacks.
- How data theft is providing greater visibility of an organization's supply chain and partners in helping cybercriminals accumulate more potential targets.
- The challenges of implementing and sustaining data hygiene practices.
- Using AI to to fill cybersecurity jobs.
- How new technology, like AI, is helping cybercriminals lower their operating costs.
- Understanding that you can't defend what you don't know or understand about your internal landscape.
- Embracing the benefits of IIoT, but understanding the security risks it carries.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.
93 odcinków
Wszystkie odcinki
×Zapraszamy w Player FM
Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.