Artwork

Contenuto fornito da Eric Sorensen. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Eric Sorensen o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

Minimizing Hacks by Focusing on Uptime

39:23
 
Condividi
 

Manage episode 451302071 series 3352216
Contenuto fornito da Eric Sorensen. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Eric Sorensen o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Send us a text

Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings.

Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality.

In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:

  • How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.
  • The need for SOPs that make it easier to assimilate cybersecurity into OT processes.
  • Ways to more safely update the growing number of devices on the plant floor.
  • Protecting IP and, more specifically, the software coding associated with it.
  • The impact AI continues to have on increasing the sophistication of hacking attempts.
  • Why all hacks are "highly preventable."
  • The role of quantum computing and the steps to take in preparing for "Q Day".

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

How Hacks Happen
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...

Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

Capitoli

1. Minimizing Hacks by Focusing on Uptime (00:00:00)

2. [Ad] How Hacks Happen (00:13:17)

3. (Cont.) Minimizing Hacks by Focusing on Uptime (00:14:07)

147 episodi

Artwork

Minimizing Hacks by Focusing on Uptime

Security Breach

0-10 subscribers

published

iconCondividi
 
Manage episode 451302071 series 3352216
Contenuto fornito da Eric Sorensen. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Eric Sorensen o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

Send us a text

Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings.

Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality.

In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:

  • How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.
  • The need for SOPs that make it easier to assimilate cybersecurity into OT processes.
  • Ways to more safely update the growing number of devices on the plant floor.
  • Protecting IP and, more specifically, the software coding associated with it.
  • The impact AI continues to have on increasing the sophistication of hacking attempts.
  • Why all hacks are "highly preventable."
  • The role of quantum computing and the steps to take in preparing for "Q Day".

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

How Hacks Happen
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...

Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

Capitoli

1. Minimizing Hacks by Focusing on Uptime (00:00:00)

2. [Ad] How Hacks Happen (00:13:17)

3. (Cont.) Minimizing Hacks by Focusing on Uptime (00:14:07)

147 episodi

Tutti gli episodi

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida

Ascolta questo spettacolo mentre esplori
Riproduci