Phish Fryday

Phish Fryday


Latest Episodes

The Cybersecurity Challenge: How to Think Like a CIO
November 23, 2021

Join Brad Boston, Christopher Burgess, and Rohyt Belani as they discuss the cybersecurity challenges facing CIOs and how organizations should respond.

Phishing Threats with Palo Alto Unit 42
October 02, 2020

Phishing threats take many forms and are used to deliver malware, steal credentials, and entice recipients into taking actions they will later regret. Despite advances in technology, these threats continue to reach inboxes and continue to succeed.

Phishing Threats with Palo Alto Unit 42
October 02, 2020

Phishing threats take many forms and are used to deliver malware, steal credentials, and entice recipients into taking actions they will later regret. Despite advances in technology, these threats continue to reach inboxes and continue to succeed.

Phishing Finance
September 11, 2020

For many organizations, financial transactions are a quick, intricate dance of payments, receivables, and reporting. Its high stakes and high pressure. Drop a phish into the midst of this environment and bad things can happen. To discuss the role of fina

Phishing Finance
September 11, 2020

For many organizations, financial transactions are a quick, intricate dance of payments, receivables, and reporting. It’s high stakes and high pressure. Drop a phish into the midst of this environment and bad things can happen.

Phishing Finance
September 11, 2020

For many organizations, financial transactions are a quick, intricate dance of payments, receivables, and reporting. It’s high stakes and high pressure. Drop a phish into the midst of this environment and bad things can happen.

Ransomware
August 28, 2020

According to the latest Ponemon Cost of Data Breach Report, over half of malicious breaches are financially motivated. When we follow the money, we see ransomware continuing to cause availability concerns, which can be addressed with mature disaster re...

Ransomware
August 28, 2020

According to the latest Ponemon Cost of Data Breach Report, over half of malicious breaches are financially motivated. When we follow the money, we see ransomware continuing to cause availability concerns, which can be addressed with mature disaster re...

Phishing Defense Expertise
August 14, 2020

Identifying a phishing email is more than a yes/no, good/bad equation. If its bad, you need to know how bad it is. If my user clicked it, what happened? What do I need to do to protect my organization? Answering these questions requires a certain level o

Phishing Defense Expertise
August 14, 2020

Identifying a phishing email is more than a yes/no, good/bad equation. If it’s bad, you need to know how bad it is. If my user clicked it, what happened? What do I need to do to protect my organization? Answering these questions requires a certain leve...