A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
A weekly Youtube show and podcast from The Breach featuring sharp commentary on politics and movements in Canada with Pam Palmater, El Jones, Martin Lukacs, and smart guests. Hosted by Donya Ziaee.
R
Reality Breached


1
Reality Breached
Sergio Lugo II, Reid Walker, Josh Alcaraz, Robert Morris & Others
Reality Breached is a Podcast about Video Games, Movies and…well, I guess we are still trying to figure that out. Things tend to get weird, enjoy…subscribe and tell your friends.
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
A militant Christian podcast with 6 guys from different walks of life, helping combat religiosity and bringing up the water level of your faith. The Breach is about challenging warriors of the faith to take the great commission up as their highest calling. It is supported by Charlie Mike International - an apparel company with the goal of financing missions around the world. Support this podcast: https://anchor.fm/charliemikeintl/support
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.breachingthewalls.org.
Pop culture talk, among other things
Breach Your Mind is a podcast dedicated to helping people navigate the rough waters that often come in life and help them gain a new perspective on situations and issues that they may be struggling with. Along with giving advice and motivation, in-depth conversations with real people will help bridge gaps in many of this life's more overwhelming matters. With a focus on community building, listeners can write to the podcast and submit their issues or topics that they want insight on.
Small time guy, with small time opinions on Magic the Gathering
The Reality Breached JXN Spotlight focuses on the people and places that make the Metro-Jackson Mississippi area unique.
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://anchor.fm/intothebreach/support
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
T
Tom McCartan's Breach Of Etiquette


1
Tom McCartan's Breach Of Etiquette
Sauropod: Podcasting the 21st Century
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
S
Soulstory: A Through the Breach Actual Play Podcast


1
Soulstory: A Through the Breach Actual Play Podcast
No Show Radio
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
L
Lecture Notes from The Breach - A Malifaux Podcast


1
Lecture Notes from The Breach - A Malifaux Podcast
Midwest Wargaming
We're a group of four Malifaux enthusiasts that help new players with advice, personal experience, and entertainment in the steampunk streets.
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students. Support this podcast: https://anchor.fm/badbreaches/support
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
Hello, I'm Danny B. I'm located in the fabulous City of Duncan, on Vancouver Island, Call the Cowichan Valley home for 23 years, educated at VIU, 15 years experience of homelessness and travel across Canada. In 1992 my feet touched down on Vancouver Island, traveling from NB to BC, started living in a city called Esquimalt. As they say, "The rest is history" I put my life experiences, adventures and truths out into a thirsty world. In this podcast you will hear 'some swearing at times" touch ...
This is “Life, Death and Data Breach”, a podcast about the pains and pitfalls of dealing with sensitive data in large and unorganized company repositories. Jeanne Somma, insights executive and counsel with ayfie and seasoned eDiscovery practitioner and Johannes Stiehler, CEO of ayfie and a linguist at heart discuss how to recognize and solve some of the challenges of discovering and protecting textual information. If you are a legal practitioner, data security officer or just interested in d ...
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
The latest edition of the ISMG Security Report investigates the reboot of ransomware group Conti, which supports Russia's invasion of Ukraine. It also discusses why paying ransomware actors is a "business decision" and how to respond to the talent shortage in the financial sector.Por DataBreachToday.com
S
Security Breach


1
Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat
12:03
12:03
Mais Tarde
Mais Tarde
Listas
Like
Curtido
12:03
What else can we say as it relates to the industrial sector and the cybersecurity threats that continue to present themselves, other than – the battle wages on. The value of the sector’s IP, the plethora of personal information and the vital need to maintain uptime makes manufacturing a favorite target of hackers. And as those in the financial and …
T
The Breach


1
Season 3 Episode 7 I Was Born This Way vs. Born Again
44:24
44:24
Mais Tarde
Mais Tarde
Listas
Like
Curtido
44:24
June has been labeled pride month which only proves that if God is for something, the culture will be against it. We must love people back to life. The excuse is "I was born this way." The fact is, we were all born this way... born with a sinful nature. But we must die to ourselves in order to be born again. --- Support this podcast: https://anchor…
A
After the Breach Podcast


1
Episode 3 - West Coast Wild Salmnesia
1:16:55
1:16:55
Mais Tarde
Mais Tarde
Listas
Like
Curtido
1:16:55
Joining us as our guest this week is professional guide and captain Daven Hafey to discuss his new documentary film project Salmnesia. Daven has extensive field experience in wild places all over the planet including the Arctic, Alaska, Antarctica, and the San Juan Islands in Washington state. We ask all our guests about memorable wildlife and whal…
T
The Breach Show


1
Corporations jacking prices | Canadians feeling conspiratorial | Breach turns one
56:10
56:10
Mais Tarde
Mais Tarde
Listas
Like
Curtido
56:10
More Canadians are having trouble putting food on their plates while corporate profits soar—why are some turning to conspiracy theories, rather than holding the real culprits accountable? Host Donya Ziaee talks with economist Jim Stanford about runaway corporate profits, and Pam, El and Martin discuss a new poll showing the mainstreaming of racist …
M
Marigold Breach


1
Introducing The Co-Founder, starring Sunita Mani and Alexandra Shipp
35:16
35:16
Mais Tarde
Mais Tarde
Listas
Like
Curtido
35:16
This week, we’re introducing you to The Co-Founder, a new show from Realm starring Sunita Mani and Alexandra Shipp. Best friends and business partners Valerie and Juliet have been struggling to secure funding for their gaming start up, WILY, but Valerie has an idea that could change everything. The Co-Founder is a Realm production. Listen Away. Lea…
B
Breaching Extinction


1
103. Orca Diet Estimates and Scientific Accessibility
41:41
41:41
Mais Tarde
Mais Tarde
Listas
Like
Curtido
41:41
This week Erica chatted with Orca Researcher Anaïs Remili about her recent publication, Validation of quantitative fatty acid signature analysis for estimating the diet composition of free‑ranging killer whales. She dove into a new methodology studying whale diets called QFASA, and also discussed her organization Whale Scientists, which aims to hig…
In "Your Lucky Day" an unusual thief runs out of luck, and in "Blackwood Hospital" a new sanitarium administrator arrives in Malifaux along with a dark secret. Read By: Henrietta MeiraAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonPor Wyrd Miniatures, LLC
Ransomware struck global currency exchange and remittance company Travelex on New Year's Eve 2019. Don Gibson, a security architect at Travelex, became publicly linked with the incident, and the undesired attention he received contributed to a health situation that nearly led to a tragic outcome.Por DataBreachToday.com
This week naturalist and local feral man of Alaska, Dale Frink to talk about the time he got thrown into the water by a blue whale. Dale has requested to raise money for the Ocean Defenders Alliance click the link to donate! Youtube Video Photos
Kendra, Liam, and Erica discuss chapters 3 & 4 of Listening to Whales by Alexandria Morton. Sources: https://www.seattletimes.com/seattle-news/environment/new-state-federal-report-puts-10-27-billion-price-tag-on-lower-snake-river-dam-removal/
The latest edition of the ISMG Security Report includes highlights and observations from RSA Conference 2022, including a key message from RSA CEO Rohit Ghai. It also discusses the value of automation and the Cybersecurity and Infrastructure Security Agency's mission to grow cyber talent.Por DataBreachToday.com
Sergio and Reid say goodbye to the old Podcast feed and give an update on how to tune into the BRAND NEW ReBre Reboot, Reality Breached Live!Por Sergio Lugo II, Reid Walker, Josh Alcaraz, Robert Morris & Others
This week Erica chatted with Hannah Overbeak and Tay Shoemaker from Project Polywog about their impact-driven business model. They shared the plight of two endangered frogs as well as insight on how they are helping these species both through a frog rescue and frog breeding programs.
In part one of "The House Folds," Nekima visits a cyclops, Angel Eyes raids a stagecoach, and Tuco torments the Ortegas. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)…
T
The Breach


1
The Breach Season 3 Episode 6 The Spear of Prayer
23:18
23:18
Mais Tarde
Mais Tarde
Listas
Like
Curtido
23:18
Arm yourselves with the armor of God and don't leave anything out... including the Spear of Prayer. Prayer is a weapon and don't let the enemy lie to you and tell you it is a last resort! --- Support this podcast: https://anchor.fm/charliemikeintl/support
This week Erica celebrated our 100th episode and pride month with a special two-part episode. In the first part, she chatted with Kendra Nelson about homosexuwhality in the animal kingdom, as well as their personal experiences being part of the LBGTQ community. For the second part, she chatted with musician and og homie Ambur Wilkerson to write "Ba…
T
The Breach Show


1
What a Doug Ford majority means for Ontario
1:28:25
1:28:25
Mais Tarde
Mais Tarde
Listas
Like
Curtido
1:28:25
This week we went live on Ontario election night. We critique the media coverage, examine the NDP’s failure to galvanize opposition to Conservatives, and remind ourselves of the impact and importance of social movements. With a second term for Doug Ford, progressive movements are in for a major fight. Featuring interviews with organizers, writers a…
The latest edition of the ISMG Security Report discusses how security researchers have warned of a new attack campaign targeting 1,200 cloud-based Elasticsearch databases. It also revisits the Kaseya supply chain attack and examines how we can mitigate mobile phone fraud.Por DataBreachToday.com
This week, we would like to introduce you to Temujin, a show distributed by Realm. Experience a tragic friendship that shaped the modern world. TEMUJIN faithfully adapts the Central Asian epic "The Secret History of the Mongols", and is the first Asian audio drama to be nominated for a Webby. Learn more about Andas Productions here. Learn more abou…
The healthcare sector is still behind many other critical infrastructure sectors in implementing critically important security technologies to protect against the rise in potentially devastating cyber incidents, says threat intelligence analyst Christiaan Beek of security firm Trellix.Por DataBreachToday.com
If software has a dangerous security flaw, should its maker tell customers to shut it down until it’s fixed? It's a tough call, but Dutch company Hoppenbrouwers says the software vendor Kaseya should have done so last year to prevent a massive supply chain attack by the REvil ransomware gang.Por DataBreachToday.com
The latest edition of the ISMG Security Report discusses how the leader of a "transnational cybercrime syndicate" has been arrested in Nigeria, according to Interpol. It also shares updates on U.S. privacy laws and how we can improve collaboration as an industry.Por DataBreachToday.com
This we Erica chatted with Owen Begley-Collier and Lucy Larkin from the Snake River Savers about their upcoming protest in Seattle to remove the Lower Snake River Dams Snake river savers social media sites: https://instagram.com/snakeriversavers?igshid=YmMyMTA2M2Y= https://www.facebook.com/snakeriversavers/ https://twitter.com/riversavers?s=21&t=Ok…
An effort to establish industry benchmarks for medical device cybersecurity maturity aims to help advance overall cybersecurity in the healthcare sector, says Rob Suárez, CISO of medical device maker Becton, Dickinson and Co. He discusses how to improve the state of medical device cybersecurity.Por DataBreachToday.com
T
The Breach


1
The Breach Season 3 Episode 5 The Image of God We Create
24:45
24:45
Mais Tarde
Mais Tarde
Listas
Like
Curtido
24:45
Reviewing a series from Pastor Andrew Willis about the image of God we create. Your image of God may not be the same God of the Bible. We cannot carve image of God that only contains what sounds nice or deal only with our preferences. The God of the Bible cannot be recreated to appease the mob. If you don't like the truth of God... it doesn't matte…
In part two of December's Call: Homecoming, Alice travels into the mountains to heed the call of December and take revenge on a fellow thief. Read By: Henrietta MeiraAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonPor Wyrd Miniatures, LLC
In this weeks porpisode Erica, Liam and Kendra dive into the first two chapters of listening to whales by Alexandria Morton.
B
Breaching Extinction


1
98. Normal People Encouraging Normal People to do Extraordinary Things
1:00:43
1:00:43
Mais Tarde
Mais Tarde
Listas
Like
Curtido
1:00:43
This week Erica chatted Alex Haraus, an impact producer focused on saving our natural world. Alex talks about how he has used TikTok as a vessel for conserving wild places and shares some of his life experiences and philosophies.
B
Breaching The Walls


1
Next Steps To Leading Like Jesus
1:06:34
1:06:34
Mais Tarde
Mais Tarde
Listas
Like
Curtido
1:06:34
Discipleship 301 - Fundamentals of Ministry: How To Lead Like Jesus --- Send in a voice message: https://anchor.fm/breachingthewalls/message
T
The Breach Show


1
Doug Ford's wreckage | Report exposes discrimination against incarcerated Indigenous women
39:48
39:48
Mais Tarde
Mais Tarde
Listas
Like
Curtido
39:48
This week, Martin and Pam break down the Ontario election: who we hate, who isn't great, and who can't communicate. El Jones joins Pam for an in-depth look at a new Senate report that calls for the exoneration of 12 imprisoned Indigenous women that provides insights in the systemic violence and discrimination of Canada's prison system. Plus, should…
The latest edition of the ISMG Security Report analyzes the changes in the ransomware landscape one year after the attack on Colonial Pipeline. It also revisits the Ryuk ransomware attack on a school district in Illinois and examines common culprits hindering effective Zero Trust adoption.Por DataBreachToday.com
S
Security Breach


1
Revisiting the JBS Ransomware Attack One Year Later
14:57
14:57
Mais Tarde
Mais Tarde
Listas
Like
Curtido
14:57
JBS Foods is a $30B meat processor that most people didn’t know about until they paid ransomware attackers REvil $11M last June in order to get plants in the U.S. and Brazil up and running, and prevent what is believed to be up to 5 TB of data from being leaked. According to SecurityScorecard.com, the hackers obtained leaked credentials from employ…
S
Security Breach


1
Cyber Hygiene and Putin's Army of Criminal Hackers
18:00
18:00
Mais Tarde
Mais Tarde
Listas
Like
Curtido
18:00
The rise in ransomware attacks throughout the industrial sector has led to a surge in another, related activity – the purchasing of cyber insurance to help soften the blow of these attacks. But today’s guest emphasizes that beyond just insurance to cover the costs of these intrusions, the manufacturing sector needs to implement more proactive strat…
S
Security Breach


1
Preventing Ransomware Attacks Through Cyber Maintenance
18:11
18:11
Mais Tarde
Mais Tarde
Listas
Like
Curtido
18:11
There were a lot of trends emanating from the mid-1980s that thankfully died out over time, but one of them has not only persisted, but thrived. Although there were numerous samples of malware impacting early computer networks, the one that captured both headlines and the admiration of cyber criminals was the PC-Write Trojan virus. Iterations would…
S
Security Breach


1
'The Industry's Attack Surface Has Exploded'
18:34
18:34
Mais Tarde
Mais Tarde
Listas
Like
Curtido
18:34
The surge in cyberattacks experienced by the industrial sector has been credited to a number of issues ranging from outdated security software to lagging protocols surrounding data access and storage. But, according to today’s guest, one of the main reasons we’ve seen an uptick in these attacks could simply be because they’re more profitable. Joel …
You’ve probably heard a number of reports citing ransomware as the leading attack strategy within the industrial sector. In some instances, it’s been reported that ransomware groups are focusing as much as 70 percent of their activity on manufacturing enterprises. In one report from ICS security specialist Dragos, it was reported that 65 percent of…
In this episode of "Cybersecurity Unplugged," Tim Danks of Global Risk Perspectives discusses issues around trusting our global supply chain, including the role of Huawei, the steps needed to secure critical infrastructure, and the process for determining a comfortable level of risk management.Por DataBreachToday.com
A new initiative aims to create a standards-based nationwide patient credential and matching ecosystem to ultimately improve matching patients with their electronic health information, says Scott Stuewe, CEO of DirectTrust, the nonprofit, vendor-neutral organization that is leading the effort.Por DataBreachToday.com
Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organizations.Por DataBreachToday.com
S
Security Breach


1
DDoS Attacks - (Part II): Preparation is Prevention
12:21
12:21
Mais Tarde
Mais Tarde
Listas
Like
Curtido
12:21
The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. Just as you continu…
S
Security Breach


1
DDoS Attacks (Part 1): 'They're Super Easy and Free'
12:25
12:25
Mais Tarde
Mais Tarde
Listas
Like
Curtido
12:25
The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. Just as you continu…
While rogue individuals with an agenda and advanced cybersecurity skills are still prevalent, most headline-grabbing hacks are now originating from well-organized, highly talented groups or organizations. Not only does this dynamic provide access to a greater pool of talent, but it makes stopping a multi-faceted attack more difficult. One of the mo…
S
Security Breach


1
Don't Fear the Hacker — Drop Some S-BOMs
13:03
13:03
Mais Tarde
Mais Tarde
Listas
Like
Curtido
13:03
Regardless of the report, survey or research, all data related to industrial cybersecurity makes one thing very clear – the last two years have presented a dangerous uptick in the number of cybersecurity attacks, and the severity of them. So, if knowing is half the battle, the other half is identifying tools to help accomplish the mission. With thi…
S
Security Breach


1
Ransomware, Log4J and When — not if — You're Hacked
14:01
14:01
Mais Tarde
Mais Tarde
Listas
Like
Curtido
14:01
Whether it's the infamous Colonial Pipeline ransomware attack last summer, or an ongoing number of water treatment facility hacks, there’s no doubt that infrastructure facilities have become a favorite target of cyber criminals. In fact, according to a recent report from Skybox Security, the first half of 2021 saw a 46% year-over-year increase in n…
If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective. I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybersecurity. He’s embraced his role as JohnE Up…
S
Security Breach


1
'Hackers are Lazy. Scammers are Misfits.'
19:36
19:36
Mais Tarde
Mais Tarde
Listas
Like
Curtido
19:36
If there’s one thing that has become very apparent in dealing with cybersecurity issues throughout the industrial sector, it’s that responding to these challenges means taking a look at things from a different perspective. Well, that’s what we have with this episode. I recently sat down with Johnny Young, a 35-year veteran of industrial IT and cybe…
S
Security Breach


1
Why Phishing Schemes Continue to Flourish
14:06
14:06
Mais Tarde
Mais Tarde
Listas
Like
Curtido
14:06
In this episode we welcome Theo Zafirakos, the Chief Information Security Officer at Terranova Security, to discuss is company's recently report indicating that the success of phishing schemes continues to escalate. Their findings include data showing that: Nearly one in every five end users (19.8 percent) who received a phishing simulation email c…
S
Security Breach


1
There's a Lot of Reasons October Could Be Terrifying
13:42
13:42
Mais Tarde
Mais Tarde
Listas
Like
Curtido
13:42
In addition to supply chain challenges and labor shortages, one of the biggest issues emerging from the COVID-19 pandemic for the industrial sector has been the huge uptick in cyberattacks. To make things worse, the Center for Strategic and International Studies, after studying cyberattack trends since 2006, says there is a clear pattern wherein th…
In this episode of Security Breach, we're joined by Thierry Aubry, a Sales Executive at Open Systems. Open Systems recently offered a look inside a phishing scheme and potential malware attack experienced by one of their customers. While this global manufacturer of home and commercial appliances will remain anonymous, Thierry will walk us through h…