
Sign up to save your podcasts
Or
In the first podcast we talked about how an organisation may defend themselves based on real world threat data, now we look at the threat actors behind the attacks, and think about how we can use that information proactively.
In this podcast we talk about:
-The different threat types and actors behind them
-How the email threat landscape has evolved, and continues to evolve based on real world events
-The various elements that make up an attack
-New variants of threat to be aware of, such as Telephone Oriented Attack Delivery (TOAD) and malicious files within container files
In the first podcast we talked about how an organisation may defend themselves based on real world threat data, now we look at the threat actors behind the attacks, and think about how we can use that information proactively.
In this podcast we talk about:
-The different threat types and actors behind them
-How the email threat landscape has evolved, and continues to evolve based on real world events
-The various elements that make up an attack
-New variants of threat to be aware of, such as Telephone Oriented Attack Delivery (TOAD) and malicious files within container files