Defense in Depth cover image

When Social Engineering Bypasses Our Cyber Tools

Defense in Depth

00:00

The Role of Rules in the Endpoint Security World

Every fishing attack is not really a fishing attack for credentials. Sometimes peoplere looking for money, sometimes they're looking for information. Some of those things lend themselves well to rules and others don't. Jeff: We should be giving be polite, but not necessarily giving people all the information they want. How do we help humans be better at being more resilient?

Play episode from 04:11
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app