
Sign up to save your podcasts
Or


In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.
In this episode we discuss:
What are BEC types of attacks?
Who is performing BEC attacks?
How are people falling for them?
What can people do protect against this type of attack?
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
By Timothy De Block4.7
4343 ratings
In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.
In this episode we discuss:
What are BEC types of attacks?
Who is performing BEC attacks?
How are people falling for them?
What can people do protect against this type of attack?
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.

372 Listeners

1,027 Listeners

8,069 Listeners