Content Types

Posts

  • Can cryptocurrency platforms claim paying attackers is a “White Hat Bounty”?
  • Lisa Forte – Darknet Diaries
  • Lloyd’s of London Exclude Nation-Backed Cyber Attacks from Insurance
  • OFAC Sanctions Tornado Cash: what this means for ransomware payments
  • Lisa Forte talks about table-top exercises on Mimecast’s Phishy Business
  • The vitally important role of loggists in a cyber incident
  • AWS/Capital One hacker jailed for massive data theft and illicit crypto mining
  • Supply Chain Security: Renaissance or Retrogression?
  • Maersk Incident Response
  • Are all Insider Threats bad apples?
  • 3 easy traps your CMT could fall into and how to prevent them
  • Your New Ransomware Business Partner  
  • Rebuilding after a cyber attack
  • Would You Fall For A $35m Voice Cloning Attack?
  • Defcon Talk: Using SE to create insider threats and win all the things
  • The Gold-Silver-Bronze Command Structure
  • Insider Theft of $119M worth of Coca Cola IP
  • Tesla Insider Threat Case (Khatilov)
  • Wargaming, Cyber Attacks and Astronaut thinking
  • The 5 Best Ways to Spot TV Licence Phishing Emails
  • What is Vishing?
  • Behaviour Change in your Organisation (short video)
  • Hacked! Right Match Singles Suffers a Data Breach..
  • Get staff engaged for Cybersecurity Awareness Month
  • CV19 and Kaspersky Next
  • pre-election tricks goes deeper than social media.
  • Insider Threat $800K Rogue Admin
  • Lisa Forte on Smashing Security Podcast
  • Permissions Creep
  • Should Your Company Ban Zoom?
  • Cyber Volunteers 19
  • Lisa Forte on Random But Memorable Podcast
  • Why Run a Cyber Exercise?
  • Insider Threats: £4.6m in self-signed invoices
  • LISA FORTE INTERVIEW WITH DIGIT MAGAZINE
  • Amazon Ring Insider Threat
  • The Facebook Insider
  • Trend Micro Insider Breach
  • Insider threat: former SEC investigator charged
  • How voice assistants can be used to phish passwords
  • Red Goat Insider Threat Report
  • 3 Steps To Make Cyber Security Awareness Month A Success
  • Red Goat finalists for Computer Security Awards 2019
  • Teiss Podcast on Insider Threat
  • Tales from the road: OSINT in the Washroom
  • Online Radicalisation and Social Engineering
  • Paris riots, Social Proof and Corporate Security
  • The Hustlers of Naples
  • Simone – A Social Media Investigation
  • Interview with DIGIT
  • Reconnaissance for Social Engineering: Tales from the Road
  • Webinar: Think like a hacker
  • Can I borrow your swipecard?
  • Stay calm and (don’t) pay the hackers
  • The enthusiastic law student
  • Criminal Justice Evolution podcast
  • The not-so-secret life of boarding passes
  • The Prisoners Dilemma and Intelligence sharing
  • Equifax Leak
  • Leak of the week: 711m email addresses
  • South Korea 2 : Trust, Cyber-Security and Wannacry
  • South Korea 1: On The Alert
  • Archives

    Menu