It’s your favorite brand ambassador here to report the latest in tech as well as how RPost is on the cutting edge of stopping cybercrimes from happening. I’m back home this week in West Texas all alone; just like some of the latest cybercriminals.
Armand here, RPost’s Armadillo product evangelist, hailing this week from wet and rainy Scotland (it rained a lot this week!). I’m here at the Association of Corporate Counsel Europe annual conference, discussing cyber-risk and sharing step-by-step how cybercriminals are orchestrating their attacks.
Armand here, RPost’s product evangelist, writing from beautiful Charlotte. I’ve been discussing security and AI at the International Legal Technology Association conference along with some of my human RPost teammates, Gerlyn, Arianna, and Laura.
Armand here again reporting for Tech Essentials. This week, I’m writing to you from…my mom’s basement. This is so that I can try and get in the mindset of a cybercriminal trying to leverage AI to perpetrate a sophisticated email scam.
Got a billion-dollar IT budget? Got the best Microsoft cybersecurity tools money can buy? Got teams and teams of IT staff who proactively monitor lights blinking on servers and charts on screens looking for cybercriminal activity within your network?
[If you are a routine kind of person, stop reading here. If you consider yourself to be less bland, I challenge you to read to the end.]
We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).
You may wish you were one of the zombies from The Last of Us after a BEC attack. Previously on Tech Essentials, we introduced you to the cybercrime phenomenon initiated by Email Eavesdropping and ending in a mis-wire, in part 1 of a 3-part series we’re running.
You may be barricaded inside the best of (fire)walls, but you could still be exposed by your recipients’ nostalgia for their memorable passwords. Joseph Heller, author of Catch 22, famously wrote that “just because you’re paranoid doesn’t mean they aren’t after you.” Many Generation Xers out there may recall that Kurt Cobain also used this […]
What were the top tech and e-security trends of 2022? What can be said about 2022 that hasn’t already been said? You’ve likely already been inundated with perfunctory retrospectives on the ‘year that was’—the Ukraine War, Elon Musk, inflation, midterms, Kanye West, ‘the slap’, Messi, et al. But I would like to think that 2022 […]
June 28, 2024
June 21, 2024
June 14, 2024
June 07, 2024
May 30, 2024