
When Social Engineering Bypasses Our Cyber Tools
Defense in Depth
00:00
The Role of Rules in the Endpoint Security World
Every fishing attack is not really a fishing attack for credentials. Sometimes peoplere looking for money, sometimes they're looking for information. Some of those things lend themselves well to rules and others don't. Jeff: We should be giving be polite, but not necessarily giving people all the information they want. How do we help humans be better at being more resilient?
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.