Enemies at the Gate

Release Date:

Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks.While more connection points can create more security soft spots for industrial enterprises, it’s no surprise that hackers would generally prefer to log in, as opposed to break in. It’s rumored that credential theft via phishing schemes is how attackers were able to infiltrate Colonial Pipeline.And as the industrial sector has added more technology, perhaps the greatest overall vulnerability is the login process. Our guest for today’s episode is  Venkat Thummisi, CTO and Founder of Inside-Out Defense. He offers some first-hand expertise on the hows and whys of access abuse.We’re also excited to announce that Security Breach is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit pentera.io.To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click here.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.

Enemies at the Gate

Title
Enemies at the Gate
Copyright
Release Date

flashback