After hardening our corporate environment and improving our device management as the chief information security officer (CISO) with other organizations, I began to notice the threat landscape changing ...
Keen to the importance of not simply clicking on any email I receive in my inbox, I recently received a message with a subject line I could not resist: “Kevin Mitnick Security Awareness Training.” For ...
WEST LAFAYETTE, Ind. — Purdue University is offering new cybersecurity short courses in social engineering and digital forensics as part of a growing suite of offerings through the Purdue Polytechnic ...
AI social engineering is just getting started. Employers must make employees aware of these risks and train them to exercise their security intuition. Here’s how. Generative AI technology such as ...
How AI-assisted social engineering attacks might evolve, and how cybersecurity could, and perhaps should, adapt to meet the ...
Social engineering is the very common practice of exploiting a human element to initiate and/or execute a cyberattack. Human weakness and ignorance present such easy targets that fully 82% of the ...
Albert Einstein once said, “Things should be as simple as possible, but no simpler.” This is particularly true when designing a security training and awareness program for your organization. The goal ...
In the two preceding columns, John Orlando discussed the ethical dimensions of social engineering in penetration testing. Today I want to look at how to use social engineering effectively for ...
In recent years, and particularly with the rise in use of social media, cyber criminals have taken to using psychological as well as technical methods of attack. Human beings, after all, are ...