Guarantees
Our post

Resources and Insights

The latest cyber security news, interviews, technologies, and resources.
Adapting to AI-Driven Threats: Dr. Joshua Scarpino’s Take on Cybersecurity
Cyber News

Adapting to AI-Driven Threats: Dr. Joshua Scarpino’s Take on Cybersecurity

In this episode of Phishing for Answers, Dr. Joshua Scarpino, CISO of TrustEngine, discusses the future of security awareness training. He highlights the importance of personalized, bite-sized training sessions and adapting to AI-driven cyber threats. Dr. Scarpino emphasizes the need for ongoing, relevant training that ties both to employees’ roles and personal lives to create a lasting culture of security. Learn how TrustEngine’s approach mirrors the key strategies that PhishFirewall brings to the table, ensuring your team is always one step ahead of evolving threats.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 24, 2024
I Swear I’m Your CFO (Send That Dough)
Cyber News

I Swear I’m Your CFO (Send That Dough)

In a world full of phishing scams and fake requests, “I Swear I’m Your CFO” brings some much-needed humor to an all-too-common scam: the fake boss asking for gift cards. This hilarious and catchy tune teaches listeners a critical cybersecurity lesson—if your CFO is asking for gift cards, it’s definitely NOT your CFO!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 19, 2024
The Human Firewall: Building a Culture of Cyber Vigilance
Cyber News

The Human Firewall: Building a Culture of Cyber Vigilance

In this episode of Phishing for Answers, Joshua Crumbaugh interviews Marcos Marrero, CISO of H.I.G. Capital, to discuss the unique security challenges in private equity and how his team has developed a culture of vigilance. Marrero shares a story about a sophisticated fake data room scam targeting their firm, emphasizing the importance of continuous security awareness and employee empowerment. Key takeaways include turning employees into “human firewalls,” fostering a “see something, say something” culture, and simplifying security communication for non-technical stakeholders. PhishFirewall’s AI cyber coach aligns with these principles by providing continuous, role-based training and phishing simulations to strengthen security both in the workplace and in employees’ personal lives.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 17, 2024
Building a Proactive Security Culture with James Phillips
Cyber News

Building a Proactive Security Culture with James Phillips

In this episode, James Phillips, Principal Consultant at SAPCG, delves into the importance of role-based training and how AI automation is transforming cybersecurity awareness. He discusses the growing sophistication of phishing attacks and how PhishFirewall’s zero-campaign management and AI-driven cyber coach provide a customized and friendly training experience. With micro-training sessions that are less than a minute long, PhishFirewall is the TikTok of cybersecurity awareness, ensuring that employees stay engaged and protected with minimal disruption to their workflow.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 11, 2024
The Evolution of Phishing: Personalized Attacks on Your Business Units
Cyber News

The Evolution of Phishing: Personalized Attacks on Your Business Units

In this episode, Christopher Russell, CISO of tZERO Group, explains how attackers are shifting from mass phishing attempts to highly targeted, personalized attacks that mimic normal business communications. Russell emphasizes the importance of role-based training, fostering a supportive security culture, and using phishing simulations to build trust within organizations. Discover how to protect your teams from this new wave of phishing threats and keep your business secure.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 10, 2024
Strengthening Security Culture with Steve Cobb, CISO of Security Scorecard
Cyber News

Strengthening Security Culture with Steve Cobb, CISO of Security Scorecard

Join us as Steve Cobb, CISO of Security Scorecard, shares insights on the human side of cybersecurity, building a strong security culture, and tackling insider threats. Don’t miss his expert take on fostering engagement and resilience in today’s evolving threat landscape. #Cybersecurity #InsiderThreats #SecurityCulture #PhishFirewall
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 9, 2024
The Importance of Empathy in Security Awareness: Insights from Tim Dzierzek, CISO of Aya Healthcare
Cyber News

The Importance of Empathy in Security Awareness: Insights from Tim Dzierzek, CISO of Aya Healthcare

Tim Dzierzek, CISO of Aya Healthcare, shares why employees are the real assets in your defense, how empathy drives better phishing simulations, and why AI-powered, role-specific training is the future of security awareness. Listen to this episode of Phishing for Answers for practical insights on building a human-centered security culture.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 9, 2024
Unleash Your Inner Superheroes: The Power of the Heroic Imagination in Cybersecurity
Educational

Unleash Your Inner Superheroes: The Power of the Heroic Imagination in Cybersecurity

Discover the concept of the heroic imagination and its relevance to cybersecurity, exploring tips for empowering employees as digital superheroes while addressing potential pitfalls and challenges.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Understanding Social Engineering: Staying Safe from Human-activated Threats
Educational

Understanding Social Engineering: Staying Safe from Human-activated Threats

Learn about different types of social engineering attacks and practical tips for improving awareness and protection!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Power of Ego Bias: How It Can Compromise the C-Suite's Cybersecurity
Educational

The Power of Ego Bias: How It Can Compromise the C-Suite's Cybersecurity

Learn how AI-driven and AI-customized training programs can help organizations mitigate the impact of ego bias in the C-Suite, fostering a proactive security culture and safeguarding cybersecurity.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Redefining Cybersecurity Training: Why Fear Tactics Need to Go
Educational

Redefining Cybersecurity Training: Why Fear Tactics Need to Go

Explore the importance of positive reinforcement in cybersecurity training and learn how companies like PhishFirewall cultivate a positive culture, empowering employees to combat cyber threats and thrive in an increasingly challenging digital world.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Human Side of Insider Threat Management: Why Mental Health Matters
Educational

The Human Side of Insider Threat Management: Why Mental Health Matters

Explore the importance of addressing mental health in insider threat management and learn how PhishFirewall's AI-driven platform creates an empathetic work environment while improving your organization's security posture.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Power of Warm Fuzzies: Elevating Your Cybersecurity Culture with Positive Relationships
Educational

The Power of Warm Fuzzies: Elevating Your Cybersecurity Culture with Positive Relationships

Explore the importance of positive relationships in fostering a strong security-conscious culture within the cybersecurity industry and learn how tools like PhishFirewall can empower employees with tailored education and simulations.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Lucifer Effect: Understanding the Roots of Toxic Cybersecurity Culture
Educational

The Lucifer Effect: Understanding the Roots of Toxic Cybersecurity Culture

Explore the toxic culture within the cybersecurity industry, identify factors fueling this mindset, and discover strategies for promoting positive change, including the adoption of innovative tools!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Social Engineering: The Modern Hacker’s Toolset
Educational

Social Engineering: The Modern Hacker’s Toolset

Social engineering refers to any attempt made by one bad actor to influence another person to do something. In the case of cyber security, social engineering is commonly used as a tactic to gain access to systems or credentials that allow the hacker to carry out a malicious cyber attack. If you are a frequent internet user, you must have encountered some intriguing pop-ups on your browser or notifications in your email like “congratulations, you just won an iPhone. Click here to claim,” which tries to lure you into interacting with corrupted links. These are a basic form of social engineering where a hacker is trying to impersonate a trusted source in order to have you give them your information or to have you access their trapped website.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
You better watch out. Holiday Cyber Grinches are about.
Educational

You better watch out. Holiday Cyber Grinches are about.

Cyber crime is on a historic rise this year, and that means you and your employees are also more vulnerable than ever to emerging cyber threats. This Cyber Monday, making sure your workforce, remote and otherwise, understand online shopping safety basics should be a top cybersecurity priority for your organization. According to February 2022 Gallup survey, 42% of US employees have a hybrid work schedule, and 39% work entirely from home, increasing the odds that your employees are doing more online shopping on-the-clock than ever before.
JOE LAHART
JOE LAHART
April 18, 2024
Punishment to Partnership: Improve Your Phishing Simulations
Educational

Punishment to Partnership: Improve Your Phishing Simulations

One of the most common features of phishing simulations within the enterprise is landing pages that are designed to determine if users will type in their credentials. At first glance, this might seem like a good idea for identifying vulnerable employees. However, it’s actually a form of exploitation that can lead to a punitive culture within the organization.
CRYSTAL FONTAINE
CRYSTAL FONTAINE
April 18, 2024
Top 5 Cognitive Biases Used by Social Engineers
Educational

Top 5 Cognitive Biases Used by Social Engineers

Phishing attacks are a common form of cybercrime that rely on psychological manipulation to trick victims into giving away sensitive information or funds. These attacks often use cognitive biases, which are mental shortcuts that people use to make decisions quickly and easily. Here are the top five cognitive biases used in phishing attacks, along with examples of what the phish might look like for each bias.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
2022 Election Cyber Security
Educational

2022 Election Cyber Security

The approach of the US election season is a good time to reflect on cyber threats to our political process, particularly from foreign state adversaries due to their vast resources, advanced capabilities, and malign intent. Cyber threats to our election system also come from other sources, such as hacktivists and criminal organizations, but while they too can create problems, they are not on the same scale or level of competence as those posed by autocratic states like China, Russia, and Iran.
GREGORY SIMS
GREGORY SIMS
April 18, 2024
A Positive Security Awareness Training Program Reduces Insider Cyber Threats
Educational

A Positive Security Awareness Training Program Reduces Insider Cyber Threats

The vast majority of employees do their level best to exercise due diligence and protect a company’s digital assets. However, many employees lack the necessary training, and The effectiveness of security awareness training efforts is largely dependent on how employees perceive the program. If staff members view it as another task that reduces their productivity and leads to more stress, they are likely to treat it like an unwelcome chore. That’s why positive employee attitudes are the bedrock of successful cybersecurity programs.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Consent Phishing: The Wolf in Sheep's Clothing
Cyber News

Consent Phishing: The Wolf in Sheep's Clothing

Consent phishing is a sneaky tactic where hackers pretend to be trustworthy apps or services to trick people into giving them permissions. Once they have these permissions, they can get into real cloud services and steal sensitive data. This post will explain what consent phishing is, how it works, and how to protect against it, with a focus on the innovative solutions provided by PhishFirewall.
JOSHUA CRUMBAUGH
November 2, 2023
Navigating the New NIST Training Guidelines: What You Need to Know
Cyber News

Navigating the New NIST Training Guidelines: What You Need to Know

Unpacking the NIST Cybersecurity Framework 2.0 Public Draft is like unboxing a new gadget—it’s the same but better. The proposed changes in the training requirements are subtle but pinpointed for clarity, trimming any room for misinterpretation. While most vendors miss the mark on role-based training, the new draft illuminates these gaps. Dive in to understand how these changes might be more significant than you think.
JOSHUA CRUMBAUGH
October 27, 2023
wormgpt: Combating AI-Driven BEC Attacks with AI-Powered Cybersecurity Solutions
Cyber News

wormgpt: Combating AI-Driven BEC Attacks with AI-Powered Cybersecurity Solutions

🚨 AI-driven BEC attacks are on the rise, with cybercriminals exploiting advanced tools like WormGPT to craft highly convincing phishing emails. Traditional security measures just won't cut it anymore. It's time to embrace PhishFirewall's innovative noLMS approach, gamified training, and AI cyber coaching to empower employees and stay ahead of these evolving threats. Let's redefine #cybersecurity training together! 💪 #PhishFirewall #BECattacks #AIDrivenCybersecurity
JOSHUA CRUMBAUGH
July 19, 2023
The Ch@ngeme! Conundrum: Strengthening Cybersecurity in Schools and Beyond
Cyber News

The Ch@ngeme! Conundrum: Strengthening Cybersecurity in Schools and Beyond

🚨 The Ch@ngeme! incident at a Michigan high school highlights the importance of cybersecurity awareness in schools & service providers. Top 5 best practices: 1️⃣ Strong password policies 2️⃣ Cybersecurity education for students & staff 3️⃣ Clear communication channels 4️⃣ Regular security assessments 5️⃣ Fostering a culture of security awareness
JOSHUA CRUMBAUGH
July 19, 2023
Pioneering Role-Based, Micro-Sized Cybersecurity Training for the Modern Workplace
Cyber News

Pioneering Role-Based, Micro-Sized Cybersecurity Training for the Modern Workplace

Discover PhishFirewall, the revolutionary cybersecurity training solution offering role-specific, time-efficient microlearning modules. Transform your team's cybersecurity awareness with our personalized, AI-enhanced approach. Make the switch to PhishFirewall. Redefine cybersecurity education in your organization.
CRYSTAL FONTAINE
June 15, 2023
Cybersecurity: Guardian or Tyrant? The Hidden Icebergs in Corporate Waters
Cyber News

Cybersecurity: Guardian or Tyrant? The Hidden Icebergs in Corporate Waters

Unchecked authority given to cybersecurity teams is a hidden iceberg posing potential threats to corporate harmony and functionality. Practices like punitive phishing simulations, imposing the 'my way or the highway' approach, fostering a superiority complex, and exploiting user trust can cause more harm than good. To foster a productive, respectful, and safe digital environment, organizations must balance their approach, allowing cybersecurity teams to serve as a collaborative force rather than an autocratic entity. PhishFirewall challenges these traditional practices, providing a non-punitive, gamified platform to create an atmosphere of continuous learning and mutual respect in the cyber realm, turning cybersecurity from a liability into an asset.
JOSHUA CRUMBAUGH
June 15, 2023
The AI Revolution: Transforming Customer Success in 2023
Cyber News

The AI Revolution: Transforming Customer Success in 2023

Explore the transformative role of AI in customer success in 2023. Learn how AI is reshaping business strategies and enhancing customer experience by predicting behavior, automating tasks, and extracting actionable insights from data.
CRYSTAL FONTAINE
June 7, 2023
Cybercrime Explosion: Navigating the PaaS Tsunami and the Lifeline of Security Training
Cyber News

Cybercrime Explosion: Navigating the PaaS Tsunami and the Lifeline of Security Training

Explore the challenges of rising cyber threats such as Phishing-as-a-Service and access brokers in our digital age. Discover the critical role of security awareness training and proactive defensive measures in combating these threats and ensuring a safe, secure digital ecosystem.
CRYSTAL FONTAINE
June 2, 2023
Choosing NoLMS over Traditional LMS: A Shift Towards Personalized Training
Cyber News

Choosing NoLMS over Traditional LMS: A Shift Towards Personalized Training

Discover why NoLMS is replacing traditional Learning Management Systems in cybersecurity training. Learn how AI, personalized learning pathways, micro-learning, role-based training, and advanced analytics are reshaping cybersecurity education.
JOSHUA CRUMBAUGH
May 24, 2023
Magnetic Attraction: A Woman's Tale of Machine Learning and New Technologies
Cyber News

Magnetic Attraction: A Woman's Tale of Machine Learning and New Technologies

Explore the fascinating intersection of artificial intelligence and materials science in 2023. Discover how machine learning is revolutionizing magnetic materials research, enhancing device performance, and redefining technological possibilities.
CRYSTAL FONTAINE
May 23, 2023
Don't Be a Cybersecurity Tool: Embrace the AI Revolution
Cyber News

Don't Be a Cybersecurity Tool: Embrace the AI Revolution

Cybersecurity has traditionally leaned on a range of tools to safeguard organizations from threats. However, these traditional approaches often lag behind the ever-evolving cyber threat landscape, with vulnerabilities arising from misconfigurations, improper usage, and reliance on human intervention. AI is set to revolutionize cybersecurity by automating threat detection and responses, allowing for faster and more precise actions. It minimizes human error, accelerates responses, and is able to learn and adapt from past incidents, thus offering a more dynamic and proactive defense system.
JOSHUA CRUMBAUGH
May 19, 2023
Breaking Through the Glass Firewall: A Deeper Dive into the Role of Women in Cybersecurity
Cyber News

Breaking Through the Glass Firewall: A Deeper Dive into the Role of Women in Cybersecurity

Explore the evolving landscape of cybersecurity through the lens of gender diversity. This article delves into the increasing role of women in cybersecurity, their significant contributions, and the importance of an inclusive future. Uncover how diversity strengthens digital defense and learn about the inspirational women leading the charge.
CRYSTAL FONTAINE
May 12, 2023
The Double-Edged Sword of AI in Ransomware: Savior or Saboteur
Cyber News

The Double-Edged Sword of AI in Ransomware: Savior or Saboteur

One of the most pressing questions is whether AI will be able to prevent ransomware attacks, or whether it will be used for ransomware attacks.
CRYSTAL FONTAINE
May 6, 2023
2023 CyberSecurity Predictions: An Escalation of Cyber Warfare
Cyber News

2023 CyberSecurity Predictions: An Escalation of Cyber Warfare

The threat from nation state threat actors will loom much larger in 2023 as the gloves come off between the market-based democracies and authoritarian adversaries like China, Russia, and Iran. Up to now the narrative about cybersecurity has mostly centered on criminal threats. Next year will bring greater attention to state-conducted and state-sponsored cyber espionage efforts and infrastructure attacks.
GREGORY SIMS
February 23, 2023
2023 CyberSecurity Predictions: AI vs AI – The Future of Cybersecurity
Cyber News

2023 CyberSecurity Predictions: AI vs AI – The Future of Cybersecurity

One of the biggest trends in cybersecurity expected in 2023 is the rise of AI-driven phishing attacks. These attacks are particularly dangerous because they use artificial intelligence to create customized, highly targeted messages that are designed to trick individuals into giving away sensitive information or clicking on malicious links.
JOSHUA CRUMBAUGH
February 14, 2023
Photo Representing how secure Huntsville is

Huntsville: A Beacon for Cybersecurity

Huntsville is a hub of technology and innovation, making it a lucrative target for cybersecurity threats. Learn How Phishfirewall Helps!
Read post
Joshua's interview with Business Insight

Cyber Security Executive 2022 | Joshua Crumbaugh, PhishFirewall | Business Insight Group

Phishfirewall's CEO Joshua discusses current phishing trends with the Business Insight Group!
Watch Now
Photo of Phishing Attack

How AI and Machine Learning are Changing the Phishing Game

Joshua discusses how AI and machine learning are redefining how the industry looks at phishing.
Read post

Learn Why World Leading Advisory Firm, Frost & Sullivan, Recommends Phishfirewall!

Strengthen your Security Awareness Training with Frost & Sullivan's white paper! Gain insights on why training is more effective when you employ an AI-powered SAT program to protect your business. Download this essential resource today!
We care about your data, learn more in our privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.