Defense in Depth cover image

How Do We Measure Our Defenses Against Social Engineering Attacks?

Defense in Depth

00:00

Practical defenses beyond recognition: verification practices

Hosts discuss offline passwords, contextual verification questions, and building familiarity with legitimate communication patterns.

Play episode from 25:06
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app