Phish Fryday

Phish Fryday


Latest Episodes

Secure Email Gateways
June 19, 2020

Phishing continues to be one of the top attack vectors faced by companies. To address this, many organizations deploy a secure email gateway SEG in InfoSec parlance. In this episode we speak with Cofense Co-founder and CTO Aaron Higbee and Cofense Secur

Secure Email Gateways
June 19, 2020

Phishing continues to be one of the top attack vectors faced by companies. To address this, many organizations deploy a secure email gateway – SEG in InfoSec parlance. In this episode we speak with Cofense Co-founder and CTO Aaron Higbee and Cofense Se...

OAuth2 Phishing Attacks
June 05, 2020

With credential theft making up a large portion of phishing attacks, many organizations wisely turn to MultiFactor Authentication (MFA) to protect the credentials of their employees. Attackers, however, are upping their game to continue gaining access ...

OAuth2 Phishing Attacks
June 05, 2020

With credential theft making up a large portion of phishing attacks, many organizations wisely turn to MultiFactor Authentication (MFA) to protect the credentials of their employees. Attackers, however, are upping their game to continue gaining access ...

Risk Management and Phishing Defense
May 29, 2020

The very act of running an organization includes risk. Successful business leaders understand what those risks are and how to manage them. Operating information systems are no different – they are at risk by nature,

Risk Management and Phishing Defense
May 29, 2020

The very act of running an organization includes risk. Successful business leaders understand what those risks are and how to manage them. Operating information systems is no different – they are at risk by nature,

Pentesting and Phishing Defense
May 22, 2020

Organization seek out security through various means – risk analysis, regulatory compliance, alignment to security frameworks – but can never really be sure they are secure. That’s where pentesting comes in – evaluating security controls through an att...

Pentesting and Phishing Defense
May 22, 2020

Organization seek out security through various means – risk analysis, regulatory compliance, alignment to security frameworks – but can never really be sure they are secure. That’s where pentesting comes in – evaluating security controls through an att...

Beyond the Inbox
May 15, 2020

Even with users reporting phishing attacks and the best analysis and response tools, there’s a chance someone has already become a victim. Security teams must race the clock to find Indicators of Compromise to identify infected endpoints and spreading ...

Beyond the Inbox
May 15, 2020

Even with users reporting phishing attacks and the best analysis and response tools, there’s a chance someone has already become a victim. Security teams must race the clock to find Indicators of Compromise to identify infected endpoints and spreading ...