Defense in Depth cover image

When Social Engineering Bypasses Our Cyber Tools

Defense in Depth

00:00

The Role of Rules in the Endpoint Security World

Every fishing attack is not really a fishing attack for credentials. Sometimes peoplere looking for money, sometimes they're looking for information. Some of those things lend themselves well to rules and others don't. Jeff: We should be giving be polite, but not necessarily giving people all the information they want. How do we help humans be better at being more resilient?

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner