DiscoverSecurity Breach'There's No Bulletproof Vest' in Cybersecurity
'There's No Bulletproof Vest' in Cybersecurity

'There's No Bulletproof Vest' in Cybersecurity

Update: 2024-08-08
Share

Description

Send us a text

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.

When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings. 

I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to Security Breach. He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.

Watch/listen as Jeremiah shares his thoughts on:

  • The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can't measure the loss of trust.
  • Why the human factor will always be the weakest link.
  • How nearly every issue in cybersecurity comes back to visibility.
  • The new challenges AI will continue to create.
  • The increasing threat stemming from new credential harvesting schemes that clone login pages.
  • The unintentional backdoor vulnerabilities created by legacy systems.
  • Why he misses the Golden Age of Bug Bounties.
  • The value of placing time limits on access to sensitive data.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

'There's No Bulletproof Vest' in Cybersecurity

'There's No Bulletproof Vest' in Cybersecurity

Eric Sorensen