social engineering

Picnic and SLNT: Protecting your organization’s people from compromise by safeguarding their personal information

Exploitation through easily accessible sensitive personal information is the single largest threat to companies and their people today. It’s how nearly all cyber-attacks begin and is at the root of …

Picnic and SLNT: Protecting your organization’s people from compromise by safeguarding their personal information Read More

Managing the human attack surface of critical infrastructure: Social engineering tactics and defense

Webinar with Robert M. Lee, Dragos Founder and CEO As traditional infrastructure has become sufficiently hardened, hackers have turned to human-hacking, or social engineering–the practice of manipulating people to get …

Managing the human attack surface of critical infrastructure: Social engineering tactics and defense Read More

Scroll to Top