Phish Fryday
Latest Episodes
Phishing Defense Expertise
Identifying a phishing email is more than a yes/no, good/bad equation. If it’s bad, you need to know how bad it is. If my user clicked it, what happened? What do I need to do to protect my organization? Answering these questions requires a certain leve...
Emotet Returns
What started out as a banking trojan has now evolved into one of the most widespread and disruptive botnets threatening organizations worldwide. Emotet. After a brief hiatus earlier in 2020, Emotet has returned with a new trick up its sleeve.
Emotet Returns
What started out as a banking trojan has now evolved into one of the most widespread and disruptive botnets threatening organizations worldwide. Emotet. After a brief hiatus earlier in 2020, Emotet has returned with a new trick up its sleeve.
Q2 2020 Phishing Review
As phishing attacks remain a top threat to organizations across the globe, its critical to understand just what tactics and techniques attackers are using. Few have the resources to defend against every possibility, and so we must consider the actual thr
Q2 2020 Phishing Review
As phishing attacks remain a top threat to organizations across the globe, it’s critical to understand just what tactics and techniques attackers are using. Few have the resources to defend against every possibility,
Cutting Through the Noise at IMAX
Security analysts need data – lots of data – to do their jobs defending organizations. It’s easy to drown in all the noise, though, and not be able to find attacks and respond quickly. In this episode we speak with IMAX Information Security Analyst Rob...
Cutting Through the Noise at IMAX
Security analysts need data – lots of data – to do their jobs defending organizations. It’s easy to drown in all the noise, though, and not be able to find attacks and respond quickly. In this episode we speak with IMAX Information Security Analyst Rob...
Cutting Through the Noise at IMAX
Security analysts need data lots of data to do their jobs defending organizations. Its easy to drown in all the noise, though, and not be able to find attacks and respond quickly. In this episode, we speak with IMAX Information Security Analyst Rob S
APIs and Automated Phishing Defense
Cyber security defenders are strapped for resources, having to constantly do more with less. The risks are many, the tools are multiplying, and yet the job continues to get harder. Here to talk about how automation and integration through API usage can...
APIs and Automated Phishing Defense
Cyber security defenders are strapped for resources, having to constantly do more with less. The risks are many, the tools are multiplying, and yet the job continues to get harder. Here to talk about how automation and integration through API usage can...