Cloud Control As Leaders At Odds Over Cyber Priorities, But Require Strong Leadership - Rob Allen - BSW #432
28 January - 1 hour 3 minsThe top social engineering attacks involve manipulating human psychology to gain access to sensitive information or systems. The most prevalent methods include various forms of phishing, pretexting, and baiting, which are often used as initial entry points for more complex attacks like business email compromise (BEC) and ransomware deployment. How do you control what users click on?
Even with integrated email solutions, like Microsoft 365, you can't control what they click on. They see a convincing email, are in a rush, or are simply distracted. Next thing you know, they enter their credentials, approve the MFA prompt—and just like that, the cybercriminals get in with full access to users’...
AI Grief, Fortinet, BSODs, WINRAR, Montreaux, Big Iron, Memory Prices, Josh Marpet... - SWN #551
40 mins
30 January Finished
To curmudgeon or not to curmudgeon, that is the question. - PSW #911
2 hours 4 mins
29 January Finished
Doombuds, Office, Telnetd, Chrome, Vishing, Ralph, PeckBirdy, The Boss, Aaran Leyland - SWN #550
39 mins
27 January Finished
Building proactive defenses that reflect the true nature of modern software risk - Paul Davis - ASW #367
1 hour 13 mins
27 January Finished
The future of data control, why detection fails, and the weekly news - Thyaga Vasudevan - ESW #443
1 hour 35 mins
26 January Finished