Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

'There's No Bulletproof Vest' in Cybersecurity

51:59
 
Share
 

Manage episode 433187938 series 3352216
Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.
When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings.

I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to Security Breach. He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.

Watch/listen as Jeremiah shares his thoughts on:

  • The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can't measure the loss of trust.
  • Why the human factor will always be the weakest link.
  • How nearly every issue in cybersecurity comes back to visibility.
  • The new challenges AI will continue to create.
  • The increasing threat stemming from new credential harvesting schemes that clone login pages.
  • The unintentional backdoor vulnerabilities created by legacy systems.
  • Why he misses the Golden Age of Bug Bounties.
  • The value of placing time limits on access to sensitive data.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Promoguy Talk Pills
Agency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Chapters

1. 'There's No Bulletproof Vest' in Cybersecurity (00:00:00)

2. [Ad] Promoguy Talk Pills (00:17:34)

3. (Cont.) 'There's No Bulletproof Vest' in Cybersecurity (00:18:07)

132 episodes

Artwork
iconShare
 
Manage episode 433187938 series 3352216
Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.
When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings.

I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to Security Breach. He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.

Watch/listen as Jeremiah shares his thoughts on:

  • The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can't measure the loss of trust.
  • Why the human factor will always be the weakest link.
  • How nearly every issue in cybersecurity comes back to visibility.
  • The new challenges AI will continue to create.
  • The increasing threat stemming from new credential harvesting schemes that clone login pages.
  • The unintentional backdoor vulnerabilities created by legacy systems.
  • Why he misses the Golden Age of Bug Bounties.
  • The value of placing time limits on access to sensitive data.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Promoguy Talk Pills
Agency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...
Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Chapters

1. 'There's No Bulletproof Vest' in Cybersecurity (00:00:00)

2. [Ad] Promoguy Talk Pills (00:17:34)

3. (Cont.) 'There's No Bulletproof Vest' in Cybersecurity (00:18:07)

132 episodes

Kaikki jaksot

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play