Defense in Depth cover image

When Social Engineering Bypasses Our Cyber Tools

Defense in Depth

CHAPTER

How to Detect Fishing Attempts

i'm not convinced a rule set is the right solution. We see lots of tooling overlooked too, that are simple solutions to these problems. I love this because it's an approach that's eyes wide open and aware of the needs of the business. i would actually extend this quote and say that fom my perspective where ere, where we need to go was really bringing this together from a human experience perspective.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner