Show notes are at https://stevelitchfield.com/sshow/chat.html
…
continue reading
Content provided by John Verry. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by John Verry or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Stopping Business Email Compromise with a Novel Malicious File Reconstruction Approach
MP3•Episode home
Manage episode 428426188 series 3260966
Content provided by John Verry. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by John Verry or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with Aviv Grafi, CTO and founder of Votiro, as they discuss innovative solutions to combat business email compromise. Join us as we discuss:
…
continue reading
- The mechanisms of business email compromise
- How malicious files are used in cyberattacks
- The limitations of traditional security methods
- The benefits of malicious file reconstruction technology
142 episodes
MP3•Episode home
Manage episode 428426188 series 3260966
Content provided by John Verry. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by John Verry or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with Aviv Grafi, CTO and founder of Votiro, as they discuss innovative solutions to combat business email compromise. Join us as we discuss:
…
continue reading
- The mechanisms of business email compromise
- How malicious files are used in cyberattacks
- The limitations of traditional security methods
- The benefits of malicious file reconstruction technology
142 episodes
Minden epizód
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.