
Sign up to save your podcasts
Or


In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.
In this episode we discuss:
What are BEC types of attacks?
Who is performing BEC attacks?
How are people falling for them?
What can people do protect against this type of attack?
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
By Timothy De Block4.7
4343 ratings
In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.
In this episode we discuss:
What are BEC types of attacks?
Who is performing BEC attacks?
How are people falling for them?
What can people do protect against this type of attack?
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.

2,002 Listeners

376 Listeners

98 Listeners

652 Listeners

1,022 Listeners

112,617 Listeners

8,017 Listeners

177 Listeners

227 Listeners

74 Listeners

60 Listeners

136 Listeners

5,469 Listeners

3,358 Listeners

46 Listeners