
Sign up to save your podcasts
Or
In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.
In this episode we discuss:
What are BEC types of attacks?
Who is performing BEC attacks?
How are people falling for them?
What can people do protect against this type of attack?
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
4.7
4343 ratings
In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.
In this episode we discuss:
What are BEC types of attacks?
Who is performing BEC attacks?
How are people falling for them?
What can people do protect against this type of attack?
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
1,983 Listeners
365 Listeners
636 Listeners
14,157 Listeners
96 Listeners
366 Listeners
1,009 Listeners
7,913 Listeners
9,568 Listeners
166 Listeners
189 Listeners
314 Listeners
74 Listeners
479 Listeners
127 Listeners