
Strategy 5: Prioritize Incident Response
Blueprint: Build the Best in Cyber Defense
00:00
What Are the Most Common Delivery Vectors for Attacker Success?
John Defterios: I think we're all thinking of things running Android and iOS. John, in this context, are you also talking about BYOD and Windows and Linux and Mac based? He says he was not thinking about that when he asked the question. However, if that's in bounds of the book, then we can answer it that way. All right. So let me rephrase this and scope it to mobile and like actual phones and things like that. What are the most common kind of delivery vectors and things that are bringing attacker success that you've seen?Defterios: You definitely get, you know, fishing, things that are coming over SMS. And so those
Transcript
Play full episode