Blueprint: Build the Best in Cyber Defense cover image

Strategy 5: Prioritize Incident Response

Blueprint: Build the Best in Cyber Defense

00:00

What Are the Most Common Delivery Vectors for Attacker Success?

John Defterios: I think we're all thinking of things running Android and iOS. John, in this context, are you also talking about BYOD and Windows and Linux and Mac based? He says he was not thinking about that when he asked the question. However, if that's in bounds of the book, then we can answer it that way. All right. So let me rephrase this and scope it to mobile and like actual phones and things like that. What are the most common kind of delivery vectors and things that are bringing attacker success that you've seen?Defterios: You definitely get, you know, fishing, things that are coming over SMS. And so those

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app