Go offline with the Player FM app!
Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy
Manage episode 345567151 series 3352216
Ironically enough, one of the biggest challenges surrounding cyber defense in the industrial sector is a lack of data – data about the attacks, the attackers, their tactics and how they were able to successfully orchestrate the onslaught of ransomware, phishing and malware schemes that are costing manufacturers millions of dollars and priceless amounts of downtime.
Working to overcome the lack of transparency is the focus of today’s guest.
Jack Rhysider is the host and founder of the Darknet Diaries podcast, where he takes listeners on a journey through the world of hacking, data breaches, and cybercrimes. He’s talked to hackers, phishing scheme experts, NSA agents, penetration testers and just about any other player you can imagine.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
136 episodes
Manage episode 345567151 series 3352216
Ironically enough, one of the biggest challenges surrounding cyber defense in the industrial sector is a lack of data – data about the attacks, the attackers, their tactics and how they were able to successfully orchestrate the onslaught of ransomware, phishing and malware schemes that are costing manufacturers millions of dollars and priceless amounts of downtime.
Working to overcome the lack of transparency is the focus of today’s guest.
Jack Rhysider is the host and founder of the Darknet Diaries podcast, where he takes listeners on a journey through the world of hacking, data breaches, and cybercrimes. He’s talked to hackers, phishing scheme experts, NSA agents, penetration testers and just about any other player you can imagine.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
136 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.