39 min

Paying Attention to BEC: The Most Costly Threat by Individual Losses DISCARDED: Tales From the Threat Research Trenches

    • Technology

When you think about the most costly threat by personal losses, most people will assume ransomware.
The real threat, however, is business email compromise (BEC). But why aren’t more companies talking about it, then?
In this episode, Tim Kromphardt and Jake G. explain BEC and why organizations need to start paying more attention.
Join us as we discuss:
The definition of BEC & why companies are paying so little attention
Using Supernova to defend against email attacks
Reporting on employment fraud   


Check out these resources we mentioned:
BEC Taxonomy: https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework
Supernova: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-launches-industrys-first-cloud-native-information-protection-and
IC3 Report: https://www.ic3.gov/
TOAD blog post: https://www.proofpoint.com/us/blog/threat-insight/caught-beneath-landline-411-telephone-oriented-attack-delivery
Railroad theft: https://www.cnn.com/2022/01/14/economy/la-freight-railroad-theft/index.html  


Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!

When you think about the most costly threat by personal losses, most people will assume ransomware.
The real threat, however, is business email compromise (BEC). But why aren’t more companies talking about it, then?
In this episode, Tim Kromphardt and Jake G. explain BEC and why organizations need to start paying more attention.
Join us as we discuss:
The definition of BEC & why companies are paying so little attention
Using Supernova to defend against email attacks
Reporting on employment fraud   


Check out these resources we mentioned:
BEC Taxonomy: https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework
Supernova: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-launches-industrys-first-cloud-native-information-protection-and
IC3 Report: https://www.ic3.gov/
TOAD blog post: https://www.proofpoint.com/us/blog/threat-insight/caught-beneath-landline-411-telephone-oriented-attack-delivery
Railroad theft: https://www.cnn.com/2022/01/14/economy/la-freight-railroad-theft/index.html  


Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!

39 min

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
TED Radio Hour
NPR