Rephonic
Artwork for Security Breach

Security Breach

Eric Sorensen
Ransomware
Cybersecurity
Industrial Cybersecurity
Manufacturing
Operational Technology
Cybersecurity Threats
Artificial Intelligence
Manufacturing Sector
Phishing Schemes
Budget Constraints In Cybersecurity
Automation
Legacy Systems
Colonial Pipeline
Denial Of Service Attacks
Supply Chain Attacks
Zero Trust
Phishing
AI In Cybersecurity
Vulnerability Assessments
SOC (security Operations Center)

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

PublishesTwice monthlyEpisodes144Founded3 years ago
Number of ListenersCategories
Tech NewsNewsTechnology

Listen to this Podcast

Artwork for Security Breach

Latest Episodes

Send us a text

Uptime.Ā 

It’s the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or crippling supply chains, the bad guys know their ultimat... more

Send us a text

While there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and wo... more

Send us a text

When talking to the experts and leading authorities that have participated in the 140+ episodes of Security Breach, there’s always a slight pause when directing their attention specifically to the industrial sector. That’s because, we... more

Send us a text

I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure.

But what if we took... more

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Nick Oram
Senior Manager of Domain and Dark Web Monitoring Solutions
Fortra
Episode: IABs, Dark Web Fueling Ransomware Surge
Rob Larson
Cybersecurity Specialist
Episode: The Evolution of OT Vulnerabilities
Will Capaccio
Expert in bug bounty programs
HackerOne
Episode: The Evolution of OT Vulnerabilities
Jesse Varsalone
Co-author of The Hack is Back and cybersecurity expert
Episode: The Evolution of OT Vulnerabilities
Paul Shaver
Cybersecurity strategist with Mandiant, focusing on industrial cybersecurity challenges.
Mandiant
Episode: The Legacy of AI in Cybersecurity
Will Capsio
Hacker and cybersecurity expert at HackerOne, specializing in AI-driven security solutions.
HackerOne
Episode: The Legacy of AI in Cybersecurity
Noam Moshe
Cybersecurity expert and member of Claroty's Team82
Claroty
Episode: A Happy Ending to the Latest ICS Hack
Jon Taylor
Cybersecurity expert at Versa
Versa
Episode: Looking Back to Move Forward
Karthik Krishnan
CEO of concentric.ai
concentric.ai
Episode: AI Is Exposing Your Most Vulnerable Attack Surface

Hosts

Jeff Franke
Editorial Director of Manufacturing.net and Manufacturing Business Technology
Jeff Renke
Editorial Director of Manufacturing.net and Manufacturing Business Technology

Reviews

5.0 out of 5 stars from 2 ratings
  • Yay

    Yay

    Apple Podcasts
    5
    🐻🐤🐰🦊FNAF
    United States5 months ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the depth of knowledge shared by guests, often emphasizing the practical advice provided.
Reviews emphasize the relevance of topics discussed, especially regarding current cybersecurity threats.
The content is praised for being timely and applicable to real-world scenarios faced by organizations.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#212
United States/News/Tech News
Apple Podcasts
#147
Ireland/News/Tech News

Talking Points

Recent interactions between the hosts and their guests.

'Nobody Should Get Ransomwared'
Q: What are some of the biggest changes you've seen over the years regarding cybersecurity threats?
Vendors are starting to take action by implementing built-in firewalling in newer systems, although retrofitting older systems remains a challenge.
The Dollars and Sense of Cybersecurity
Q: What are you seeing in working with manufacturers to break down IT and OT silos?
Lovejoy notes there are organizations making progress, but many critical sectors still lag due to funding and cultural challenges.
The Dollars and Sense of Cybersecurity
Q: Where do you typically start when working with a manufacturer?
Starting with examining what the organization has and identifying connections to the internet, especially for those with lower maturity in cybersecurity.
The Dollars and Sense of Cybersecurity
Q: What drew you to getting involved in manufacturing?
Chris Lovejoy shares about an incident involving a manufacturing company that faced cyber threats during the early pandemic, prompting his deep dive into manufacturing's unique cybersecurity challenges.
The Protection and Productivity of Zero Trust
Q: Roman, do you think there's a culture in manufacturing when it comes to security that just hasn't become the priority that it should be yet?
Yes, there is a mentality that cybersecurity won't happen to them, and production focuses remain primary, often pushing cyber concerns to the back.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Security Breach

What is Security Breach about and what kind of topics does it cover?

Focusing on the rapidly evolving landscape of cybersecurity threats, this podcast provides in-depth discussions on various issues facing the industrial sector in the United States. Episodes vary in topics but frequently cover critical issues such as ransomware attacks, malware developments, phishing schemes, and DDoS attacks. Notable industry experts often join the discussions, offering insights and strategies for organizations to navigate the complexities of cybersecurity threats.

Where can I find podcast stats for Security Breach?

Rephonic provides a wide range of podcast stats for Security Breach. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Security Breach and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Security Breach get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Security Breach, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Security Breach?

Rephonic provides comprehensive predictive audience data for Security Breach, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Security Breach have?

To see how many followers or subscribers Security Breach has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Security Breach?

These podcasts share a similar audience with Security Breach:

1. Cyber Security Headlines

How many episodes of Security Breach are there?

Security Breach launched 3 years ago and published 144 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Security Breach?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Security Breach?

Rephonic pulls ratings and reviews for Security Breach from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Security Breach?

Rephonic provides full transcripts for episodes of Security Breach. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Security Breach?

Recent guests on Security Breach include:

1. Nick Oram
2. Rob Larson
3. Will Capaccio
4. Jesse Varsalone
5. Paul Shaver
6. Will Capsio
7. Noam Moshe
8. Jon Taylor

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days