Have you ever wondered what it’s like to be a cybercriminal—how it’s done and what’s involved? If so, you’re in luck. In our new podcast series, How to Be a Cyber Criminal, we explore the mind of a cyber attacker. We dive into how they think, how they work and what they’re after. Because sometimes, to stop an attacker, you need to think like one.
Throughout this series, you’ll hear from our top cybersecurity experts on everything from what type of attack a cybercriminal should use to get started to how exactly they get paid. We learn all the tricks of the trade to see what’s behind the scenes of cyber manipulation.
Listen to the first two episodes of our new series, How to Be a Cyber Criminal, here:
These first episodes focus on the key pillars of cybercrime strategy (our findings might surprise you) and what makes business email compromise (BEC), one of the top threats plaguing organizations today, so effective.
Do you think you have what it takes to become a cyber criminal? Listen to find out. And don’t forget to subscribe to Protecting People: Cybersecurity for the Rest of Us on your favorite podcast player so that you never miss an episode.
Subscribe to the Proofpoint Blog