Phish Fryday Podcast
1) The Cybersecurity Challenge: How to Think Like a CIO
Join Brad Boston, Christopher Burgess, and Rohyt Belani as they discuss the cybersecurity challenges facing CIOs and how organizations should respond.
2) Phishing Threats with Palo Alto Unit 42
Phishing threats take many forms and are used to deliver malware, steal credentials, and entice recipients into taking actions they will later regret. Despite advances in technology, these threats con...Show More
3) Phishing Finance
For many organizations, financial transactions are a quick, intricate dance of payments, receivables, and reporting. It’s high stakes and high pressure. Drop a phish into the midst of this environment...Show More
4) Ransomware
According to the latest Ponemon Cost of Data Breach Report, over half of malicious breaches are financially motivated. When we follow the money, we see ransomware continuing to cause availability conc...Show More
5) Phishing Defense Expertise
Identifying a phishing email is more than a yes/no, good/bad equation. If it’s bad, you need to know how bad it is. If my user clicked it, what happened? What do I need to do to protect my organizatio...Show More
6) Emotet Returns
What started out as a banking trojan has now evolved into one of the most widespread and disruptive botnets threatening organizations worldwide. Emotet. After a brief hiatus earlier in 2020, Emotet ha...Show More
7) Q2 2020 Phishing Review
As phishing attacks remain a top threat to organizations across the globe, it’s critical to understand just what tactics and techniques attackers are using. Few have the resources to defend against ev...Show More
8) Cutting Through the Noise at IMAX
Security analysts need data – lots of data – to do their jobs defending organizations. It’s easy to drown in all the noise, though, and not be able to find attacks and respond quickly. In this episode...Show More
9) APIs and Automated Phishing Defense
Cyber security defenders are strapped for resources, having to constantly do more with less. The risks are many, the tools are multiplying, and yet the job continues to get harder. Here to talk about ...Show More
10) Secure Email Gateways
Phishing continues to be one of the top attack vectors faced by companies. To address this, many organizations deploy a secure email gateway – SEG in InfoSec parlance. In this episode we speak with Co...Show More