Security Breach: Enemies at the Gate

Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks.

While more connection points can create more security soft spots for industrial enterprises, it’s no surprise that hackers would generally prefer to log in, as opposed to break in. It’s rumored that credential theft via phishing schemes is how attackers were able to infiltrate Colonial Pipeline.

For Similar Content: Subscribe to Daily Newsletters

And as the industrial sector has added more technology, perhaps the greatest overall vulnerability is the login process. 

Our guest for today’s episode is  Venkat Thummisi, CTO and Founder of Inside-Out Defense. He offers some first-hand expertise on the hows and whys of access abuse.

We’re also excited to announce that Security Breach is being sponsored by Pentera. For more information on how Automated Security Validation can help you safely test all your IT security controls with the click of a button in a non-stop industrial operational environment, visit pentera.io.

To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click here.



More in Business Technology