While more connection points can create more security soft spots for industrial enterprises, itβs no surprise that hackers would generally prefer to log in, as opposed to break in. Itβs rumored that credential theft via phishing schemes is how attackers were able to infiltrate Colonial Pipeline.
For Similar Content: Subscribe to Daily Newsletters
And as the industrial sector has added more technology, perhaps the greatest overall vulnerability is the login process.
Our guest for todayβs episode is Venkat Thummisi, CTO and Founder of Inside-Out Defense. He offers some first-hand expertise on the hows and whys of access abuse.
Weβre also excited to announce that Security Breach is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit pentera.io.
To download our latest report on industrial cybersecurity, The Industrial Sectorβs New Battlefield, click here.