Artwork

Content provided by Tiffany Orth and LBMC Information Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tiffany Orth and LBMC Information Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Targeted Attacks Compared to Opportunistic Attacks

8:28
 
Share
 

Manage episode 218174631 series 1526526
Content provided by Tiffany Orth and LBMC Information Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tiffany Orth and LBMC Information Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

All companies are subject to opportunistic attacks, but do you know if you are subject to a targeted attack based on the data you generate or maintain? In this podcast, LBMC Information Security’s Bill Dean addresses this question while diving deeper into the key differences between targeted attacks and opportunistic attacks.

  continue reading

67 episodes

Artwork
iconShare
 
Manage episode 218174631 series 1526526
Content provided by Tiffany Orth and LBMC Information Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tiffany Orth and LBMC Information Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

All companies are subject to opportunistic attacks, but do you know if you are subject to a targeted attack based on the data you generate or maintain? In this podcast, LBMC Information Security’s Bill Dean addresses this question while diving deeper into the key differences between targeted attacks and opportunistic attacks.

  continue reading

67 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide