Into the Breach by IBM
Activity Overview
Episode publication activity over the past year
Episodes
Cyber leaders: Stop being your own worst career enemy. Here’s how.
10 Jul 2023
Contributed by Lukas
Technically proficient people often face challenges when looking for (or being elevated to) leadership roles.In the cyber realm, this can become even ...
The Quantum Quandary: How researchers are bridging the supercomputer security concerns
03 Jul 2023
Contributed by Lukas
Quantum computing relies on quantum physics for computational power and computes much faster than classical computers. It’s predicted to provide maj...
Threat sharing evolution: How groups offer less risk and better intelligence to members
28 Jun 2023
Contributed by Lukas
It’s been eight years since the Cybersecurity Information Sharing Act was signed into law, and today we have a thriving network of public/private th...
Your private information is probably being sold on the dark web. How can criminals use it?
06 Apr 2023
Contributed by Lukas
Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks. Stephanie Caruthers—...
Operational Technology: The evolving threats that might shift regulatory policy
23 Mar 2023
Contributed by Lukas
Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022—a direct result of Russia’s i...
The threat landscape 2023: Top targets, top attack types, top geographies
01 Mar 2023
Contributed by Lukas
Every year, the IBM Security X-Force team of cyber experts mine billions of data points to reveal today's biggest attack trends and patterns. In this ...
2023 Cybersecurity Predictions
21 Feb 2023
Contributed by Lukas
In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is Dan Lohrmann, a well-known voice in cyb...
Curse of Cassandra or Hype of Chicken Little? Sorting Out Fact From Fiction On Operational Technology Security Risks
16 Feb 2022
Contributed by Lukas
Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kube...
Now You See Me, Now You Don't: How Cryptocurrency Regulation Can Make it Harder For Cybercriminals to Escape
09 Feb 2022
Contributed by Lukas
Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law...
I'd Like to Buy a Vowel: The Price of Poor Communication During a Data Breach
02 Feb 2022
Contributed by Lukas
When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—c...
Cybersecurity Superheroes Next Gen: How Higher-Ed Helps Them Find Their Crime-Fighting Niche
26 Jan 2022
Contributed by Lukas
Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep...
Lured To The Dark Side The Criminal Hacker Journey Pt. 2
19 Jan 2022
Contributed by Lukas
Part 2 of this two-part episode looks at the flip side of criminal hacks —the defense. Law enforcement and private security teams work diligen...
Lured To The Dark Side: The Criminal Hacker Journey Pt. 1
12 Jan 2022
Contributed by Lukas
In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and wh...
Into the Breach - Trailer
24 Dec 2021
Contributed by Lukas
Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast a...