Preserving Uptime in the Face of Evolving Attacks

Security Breach

Security Breach
Preserving Uptime in the Face of Evolving Attacks
Oct 31, 2025
Eric Sorensen

Send us a text

Uptime. 

It’s the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or crippling supply chains, the bad guys know their ultimate goals of disruption or extortion will be realized.

And as we’ve discussed numerous times here on Security Breach, keeping these bad actors out has become more and more difficult as new technology, connectivity and endpoints are added to the OT landscape.

Hackers are getting smarter and more complex, but the good news is so are the tools and strategies for the good guys. Here to offer some perspective on dealing with the leading threats targeting the people, systems and data of the industrial sector is a collection of experts focused on minimizing disruptions and preparing you to react and respond to cyberattacks.

Watch/listen as:

  • Max Clausen, senior VP of Network Connectivity at Zayo dives into the factors and strategies driving DDoS or distributed denial of service attacks.
  • John Carse, Field CISO at SquareX discusses the ongoing impact of developing and legacy vulnerabilities, as well as some of the novel strategies hackers are using to introduce new strands of highly disruptive malware.
  • Amit Hammer, CEO of Salvador Tech talks about lessons learned from the recent Jaguar Land Rover attack and how response strategies will continue to play a key role in minimizing attack-related downtime.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.

Listen on: Apple Podcasts   Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork Preserving Uptime in the Face of Evolving Attacks 31:38 Episode Artwork New Patching Strategies for Old Vulnerabilities 26:45 Episode Artwork The Wild & Weird of Industrial Cybersecurity 31:06 Episode Artwork Using AI to Stay Ahead of the Hack 32:14 Episode Artwork Threat Landscape Update 50:05 Episode Artwork Cure Me or Kill Me - The Little Things That Escalate Attacks 43:51 Episode Artwork Being 'Proactively Paranoid, Not Paralyzed' 37:27 Episode Artwork Why More Hackers Are Logging On Than Breaking In 33:00 Episode Artwork You Think You Know Me 35:39 Episode Artwork Avoiding the Ostrich Approach 51:19 Episode Artwork 'We've Made Our Own Prison' 42:52 Episode Artwork Dark AI Speeding Hacker Evolution 36:44 Episode Artwork Why Ransomware, Credential Theft and Phishing Schemes Persist 39:55 Episode Artwork Unsecure Webcam Was All a Ransomware Group Needed 31:56 Episode Artwork IABs, Dark Web Fueling Ransomware Surge 39:14 Episode Artwork Manufacturing’s Internal Cyber Struggles 27:51 Episode Artwork Observations of an Ethical Hacking Researcher 36:08 Episode Artwork The Evolution of OT Vulnerabilities 37:20 Episode Artwork The Legacy of AI in Cybersecurity 27:18 Episode Artwork A Happy Ending to the Latest ICS Hack 29:58 Episode Artwork The Biggest Hacks of 2024 40:34 Episode Artwork Looking Back to Move Forward 42:02 Episode Artwork AI Is Exposing Your Most Vulnerable Attack Surface 35:50 Episode Artwork Minimizing Hacks by Focusing on Uptime 39:08 Episode Artwork What Cybersecurity Can Learn from Tom Brady 53:13