Featured Posts
Episode Description
A big part of the cyber criminal's toolkit is impersonation. Phishing and Business Email Compromise can start with impersonation of authority in an effort to manipulate their intended victim into revealing sensitive information, or separating them from their money. We're told to verify identities, but how do we do this, when Generative AI is making it so much easier to impersonate people over the phone, and in videos?