As we move into 2026, social engineering is shifting from a tactical security concern to a leadership and governance ...
After hardening our corporate environment and improving our device management as the chief information security officer (CISO) with other organizations, I began to notice the threat landscape changing ...
Keen to the importance of not simply clicking on any email I receive in my inbox, I recently received a message with a subject line I could not resist: “Kevin Mitnick Security Awareness Training.” For ...
With organizations becoming more digitally interconnected, threat actors are placing greater emphasis on manipulating people instead of breaching systems directly. One of the most deceptive and ...
Social engineering-based attacks are a popular form of security manipulation, with cybercriminals using this technique for 98% of attacks in 2022. Social engineering can take many forms, including ...
In recent years, and particularly with the rise in use of social media, cyber criminals have taken to using psychological as well as technical methods of attack. Human beings, after all, are ...
In the two preceding columns, John Orlando discussed the ethical dimensions of social engineering in penetration testing. Today I want to look at how to use social engineering effectively for ...
The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel ...
Over the last decade, social engineering cyberthreats have surged among retailers just as the sector's reliance on customer data, financial transactions and e-commerce platforms has intensified. See ...
Albert Einstein once said, “Things should be as simple as possible, but no simpler.” This is particularly true when designing a security training and awareness program for your organization. The goal ...
Social engineering takes advantage of the emotions and fallibility of end users rather than relying on technical hacking techniques — and it represents a massive threat to modern organizations.
When was the last time you had to threaten to shoot an unauthorized executive who was demanding access to a secure area? Read on for a real-life story and an important lesson on effective security ...