Listen "DDoS Attacks - (Part II): Preparation is Prevention"
Episode Synopsis
Send us a textThe industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update and enhance their schemes in order to improve the success rate of their attacks. In an effort to help counter these bad actors and stay a step ahead, NETSCOUT Systems recently unveiled their bi-annual Threat Intelligence Report. It offers insight on the continued threats presented by Distributed Denial of Service and ransomware attacks. To help walk us through the report and offer additional insight on some of the new tactics being utilized to carry out these legacy cybersecurity attacks is NETSCOUT’s Threat Intelligence Lead, Richard Hummel.For more information on the work NETSCOUT does, you can go to netscout.com. And to get a look at their recent report, you can go to https://www.netscout.com/threatreportTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].
More episodes of the podcast Security Breach
You Don't Have to Out-Tech the Hacker
19/12/2025
Speaking the Right Language
04/12/2025
Why People Are Not the Biggest Risk
14/11/2025
The Wild & Weird of Industrial Cybersecurity
03/10/2025
Using AI to Stay Ahead of the Hack
18/09/2025
Threat Landscape Update
05/09/2025
Being 'Proactively Paranoid, Not Paralyzed'
08/08/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.