Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Into the Breach by IBM

Technology Education

Activity Overview

Episode publication activity over the past year

Episodes

Cyber leaders: Stop being your own worst career enemy. Here’s how.

10 Jul 2023

Contributed by Lukas

Technically proficient people often face challenges when looking for (or being elevated to) leadership roles.In the cyber realm, this can become even ...

The Quantum Quandary: How researchers are bridging the supercomputer security concerns

03 Jul 2023

Contributed by Lukas

Quantum computing relies on quantum physics for computational power and computes much faster than classical computers. It’s predicted to provide maj...

Threat sharing evolution: How groups offer less risk and better intelligence to members

28 Jun 2023

Contributed by Lukas

It’s been eight years since the Cybersecurity Information Sharing Act was signed into law, and today we have a thriving network of public/private th...

Your private information is probably being sold on the dark web. How can criminals use it?

06 Apr 2023

Contributed by Lukas

Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks. Stephanie Caruthers—...

Operational Technology: The evolving threats that might shift regulatory policy

23 Mar 2023

Contributed by Lukas

Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022—a direct result of Russia’s i...

The threat landscape 2023: Top targets, top attack types, top geographies

01 Mar 2023

Contributed by Lukas

Every year, the IBM Security X-Force team of cyber experts mine billions of data points to reveal today's biggest attack trends and patterns. In this ...

2023 Cybersecurity Predictions

21 Feb 2023

Contributed by Lukas

In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is Dan Lohrmann, a well-known voice in cyb...

Curse of Cassandra or Hype of Chicken Little? Sorting Out Fact From Fiction On Operational Technology Security Risks

16 Feb 2022

Contributed by Lukas

Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kube...

Now You See Me, Now You Don't: How Cryptocurrency Regulation Can Make it Harder For Cybercriminals to Escape

09 Feb 2022

Contributed by Lukas

Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law...

I'd Like to Buy a Vowel: The Price of Poor Communication During a Data Breach

02 Feb 2022

Contributed by Lukas

When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—c...

Cybersecurity Superheroes Next Gen: How Higher-Ed Helps Them Find Their Crime-Fighting Niche

26 Jan 2022

Contributed by Lukas

Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep...

Lured To The Dark Side The Criminal Hacker Journey Pt. 2

19 Jan 2022

Contributed by Lukas

Part 2 of this two-part episode looks at the flip side of criminal hacks  â€”the defense. Law enforcement and private security teams work diligen...

Lured To The Dark Side: The Criminal Hacker Journey Pt. 1

12 Jan 2022

Contributed by Lukas

In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and wh...

Into the Breach - Trailer

24 Dec 2021

Contributed by Lukas

Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast a...