Guarantees
Our post

Resources and Insights

The latest cyber security news, interviews, technologies, and resources.
Unhooking the Future: A Candid Conversation with Jyotin Gambhir, CISO of SecureFlo
Cyber News

Unhooking the Future: A Candid Conversation with Jyotin Gambhir, CISO of SecureFlo

In this episode of Phishing for Answers, Jyotin Gambhir offers not just a roadmap for understanding advanced phishing techniques and the disruptive impact of AI, but also a reminder about the critical importance of human awareness. From phishing redirects to deepfakes and beyond, the conversation unearthed both the dangers and defenses in today’s digital age. Whether you’re a cybersecurity veteran or just starting on your journey, this episode is packed with insights that will challenge your assumptions and equip you with actionable strategies. Remember: in the world of cybersecurity, stay aware, keep learning, and never let yourself get hooked. Listen to the full episode for a deep dive into these topics and join us next time on Phishing for Answers!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
March 5, 2025
Unhooking Phishing: A Deep Dive into Cyber Deception with Dean Sapp
Cyber News

Unhooking Phishing: A Deep Dive into Cyber Deception with Dean Sapp

This episode of Phishing for Answers with Dean Sapp is a must-listen for anyone in cybersecurity or anyone concerned with the ever-evolving tactics of cybercriminals. It’s a blend of humor, real-world insights, and hard-learned lessons that remind us all: in the modern digital world, staying vigilant is not just an option—it’s a necessity. Be sure to tune into the full conversation on our podcast platforms to catch every detail of this engaging discussion. And as always, keep fishing for answers—but never get hooked!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
March 5, 2025
AI Phishing Attacks Exposed—Protect Your Team Today!
Cyber News

AI Phishing Attacks Exposed—Protect Your Team Today!

In our latest blog post, we explore how different departments within an organization face unique cybersecurity threats, each requiring a tailored defense strategy. From sales teams dealing with phishing emails disguised as client communications to developers targeted with malicious code embedded in code repositories, recognizing these distinct attack profiles is crucial. By implementing role-based training and microlearning, organizations can empower every employee to become a vigilant defender against threats specific to their roles. Discover how PhishFirewall's customized approach transforms departmental vulnerabilities into collective strengths, fostering a security-aware culture across the entire organization.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
January 7, 2025
Elevating Experts Reveal the #1 Mistake Companies Make in Cybersecurity!
Cyber News

Elevating Experts Reveal the #1 Mistake Companies Make in Cybersecurity!

In our latest blog post, we reveal how even top cybersecurity executives aren't immune to sophisticated cyber attacks! 😱 **Chris Nicolaou, the Chief Information Security Officer (CISO) of CloudSpace**, shared his shocking experience of nearly falling victim to a cunning phishing attempt. This eye-opening incident highlights the hidden dangers lurking within organizations and how hackers exploit human vulnerability—even among the experts. But there's good news! You can transform your biggest vulnerability—your employees—into your greatest strength. Discover how microtraining, role-based education, and positive reinforcement can empower your team to outsmart cybercriminals at every turn. Learn about the game-changing strategies and tools (like PhishFirewall's AI Cyber Coach) that can keep your business one step ahead of evolving threats. 🚀 Don't miss out on these insider insights that could save your company from disaster! Read the full story now and take the first step toward fortifying your organization's cybersecurity posture.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
January 7, 2025
Stop Cyber Threats at Their Source: The Power of Human-Centric Training
Cyber News

Stop Cyber Threats at Their Source: The Power of Human-Centric Training

In a recent episode of the "Phishing for Answers" podcast, PhishFirewall's CEO, Joshua Crumbaugh, had a conversation with cybersecurity expert Ray Espinoza about the crucial role of human behavior in cybersecurity. They discussed how understanding and leveraging behavioral science can transform employees from potential risks into valuable assets in the fight against cyber threats. By focusing on relationship-building, role-based training, gamification, and continuous microtraining, organizations can reduce human error and build a positive security culture. PhishFirewall's innovative approach aligns perfectly with these strategies, offering AI-driven, gamified training solutions that make security awareness engaging and effective.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
January 7, 2025
Eliminating Human Error: How Behavioral Science Transforms Cybersecurity
Cyber News

Eliminating Human Error: How Behavioral Science Transforms Cybersecurity

In a recent episode of the "Phishing for Answers" podcast, PhishFirewall's CEO, Joshua Crumbaugh, sat down with cybersecurity expert Pieter VanIperen of Own Company to discuss how understanding human behavior is key to reducing human error in cybersecurity. They explored how leveraging behavioral science, role-based training, and positive reinforcement can transform employees from potential risks into strong defenders against cyber threats. By focusing on gamification, AI-driven insights, and just-in-time training, they highlighted how organizations can build a human-centric cybersecurity culture that reduces errors and enhances overall security. PhishFirewall's innovative approach makes cybersecurity training engaging and effective, turning human error into an organization's greatest defense.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
January 7, 2025
Secure Your Organization in 42 Seconds: Micro-Training Explained
Cyber News

Secure Your Organization in 42 Seconds: Micro-Training Explained

In a recent episode of the "Phishing for Answers" podcast, PhishFirewall's CEO, Joshua Crumbaugh, and cybersecurity expert Norman Kromberg discuss how human-centric approaches can significantly reduce human error in cybersecurity. They explore the power of role-based training, the effectiveness of micro-training through short videos, and the importance of positive reinforcement. By focusing on engaging and tailored training methods, organizations can transform their employees from potential risks into their strongest defense against cyber threats. PhishFirewall leads the way with innovative micro-training solutions that make cybersecurity both accessible and enjoyable for everyone.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
November 9, 2024
Cybersecurity Revolution with Jess Vachon, CISO of PRA Group: How Role-Based Training and Automated Defense Can Shield Your Business
Cyber News

Cybersecurity Revolution with Jess Vachon, CISO of PRA Group: How Role-Based Training and Automated Defense Can Shield Your Business

🚀 New Blog Post: I had an insightful conversation with Jess Vachon, CISO of PRA Group, about revolutionizing cybersecurity through role-based training and automation. Discover how micro-learning and AI awareness are critical in today’s threat landscape, and how solutions like PhishFirewall can shield your business from sophisticated cyber attacks. 👉 Watch the full episode to learn how to fortify your defenses and empower your team!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
November 2, 2024
Question Everything: Redefining Cybersecurity Training with Wendy Nather and Joshua Crumbaugh
Cyber News

Question Everything: Redefining Cybersecurity Training with Wendy Nather and Joshua Crumbaugh

Wendy Nather, a cybersecurity leader, joins PhishFirewall CEO Joshua Crumbaugh to tackle some of the biggest gaps in security awareness. They examine why traditional training often fails, the transformative impact of role-based and AI-driven training, and why users should be viewed as assets rather than weak links. Wendy shares insights from research showing that organizations with targeted, role-specific training see far better outcomes. They also discuss the importance of creating an open environment where employees feel empowered to report security concerns.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
October 30, 2024
Unleash Your Inner Superheroes: The Power of the Heroic Imagination in Cybersecurity
Educational

Unleash Your Inner Superheroes: The Power of the Heroic Imagination in Cybersecurity

Discover the concept of the heroic imagination and its relevance to cybersecurity, exploring tips for empowering employees as digital superheroes while addressing potential pitfalls and challenges.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Understanding Social Engineering: Staying Safe from Human-activated Threats
Educational

Understanding Social Engineering: Staying Safe from Human-activated Threats

Learn about different types of social engineering attacks and practical tips for improving awareness and protection!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Power of Ego Bias: How It Can Compromise the C-Suite's Cybersecurity
Educational

The Power of Ego Bias: How It Can Compromise the C-Suite's Cybersecurity

Learn how AI-driven and AI-customized training programs can help organizations mitigate the impact of ego bias in the C-Suite, fostering a proactive security culture and safeguarding cybersecurity.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Redefining Cybersecurity Training: Why Fear Tactics Need to Go
Educational

Redefining Cybersecurity Training: Why Fear Tactics Need to Go

Explore the importance of positive reinforcement in cybersecurity training and learn how companies like PhishFirewall cultivate a positive culture, empowering employees to combat cyber threats and thrive in an increasingly challenging digital world.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Human Side of Insider Threat Management: Why Mental Health Matters
Educational

The Human Side of Insider Threat Management: Why Mental Health Matters

Explore the importance of addressing mental health in insider threat management and learn how PhishFirewall's AI-driven platform creates an empathetic work environment while improving your organization's security posture.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Power of Warm Fuzzies: Elevating Your Cybersecurity Culture with Positive Relationships
Educational

The Power of Warm Fuzzies: Elevating Your Cybersecurity Culture with Positive Relationships

Explore the importance of positive relationships in fostering a strong security-conscious culture within the cybersecurity industry and learn how tools like PhishFirewall can empower employees with tailored education and simulations.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
The Lucifer Effect: Understanding the Roots of Toxic Cybersecurity Culture
Educational

The Lucifer Effect: Understanding the Roots of Toxic Cybersecurity Culture

Explore the toxic culture within the cybersecurity industry, identify factors fueling this mindset, and discover strategies for promoting positive change, including the adoption of innovative tools!
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Social Engineering: The Modern Hacker’s Toolset
Educational

Social Engineering: The Modern Hacker’s Toolset

Social engineering refers to any attempt made by one bad actor to influence another person to do something. In the case of cyber security, social engineering is commonly used as a tactic to gain access to systems or credentials that allow the hacker to carry out a malicious cyber attack. If you are a frequent internet user, you must have encountered some intriguing pop-ups on your browser or notifications in your email like “congratulations, you just won an iPhone. Click here to claim,” which tries to lure you into interacting with corrupted links. These are a basic form of social engineering where a hacker is trying to impersonate a trusted source in order to have you give them your information or to have you access their trapped website.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
You better watch out. Holiday Cyber Grinches are about.
Educational

You better watch out. Holiday Cyber Grinches are about.

Cyber crime is on a historic rise this year, and that means you and your employees are also more vulnerable than ever to emerging cyber threats. This Cyber Monday, making sure your workforce, remote and otherwise, understand online shopping safety basics should be a top cybersecurity priority for your organization. According to February 2022 Gallup survey, 42% of US employees have a hybrid work schedule, and 39% work entirely from home, increasing the odds that your employees are doing more online shopping on-the-clock than ever before.
JOE LAHART
JOE LAHART
April 18, 2024
Punishment to Partnership: Improve Your Phishing Simulations
Educational

Punishment to Partnership: Improve Your Phishing Simulations

One of the most common features of phishing simulations within the enterprise is landing pages that are designed to determine if users will type in their credentials. At first glance, this might seem like a good idea for identifying vulnerable employees. However, it’s actually a form of exploitation that can lead to a punitive culture within the organization.
CRYSTAL FONTAINE
CRYSTAL FONTAINE
April 18, 2024
Top 5 Cognitive Biases Used by Social Engineers
Educational

Top 5 Cognitive Biases Used by Social Engineers

Phishing attacks are a common form of cybercrime that rely on psychological manipulation to trick victims into giving away sensitive information or funds. These attacks often use cognitive biases, which are mental shortcuts that people use to make decisions quickly and easily. Here are the top five cognitive biases used in phishing attacks, along with examples of what the phish might look like for each bias.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
2022 Election Cyber Security
Educational

2022 Election Cyber Security

The approach of the US election season is a good time to reflect on cyber threats to our political process, particularly from foreign state adversaries due to their vast resources, advanced capabilities, and malign intent. Cyber threats to our election system also come from other sources, such as hacktivists and criminal organizations, but while they too can create problems, they are not on the same scale or level of competence as those posed by autocratic states like China, Russia, and Iran.
GREGORY SIMS
GREGORY SIMS
April 18, 2024
A Positive Security Awareness Training Program Reduces Insider Cyber Threats
Educational

A Positive Security Awareness Training Program Reduces Insider Cyber Threats

The vast majority of employees do their level best to exercise due diligence and protect a company’s digital assets. However, many employees lack the necessary training, and The effectiveness of security awareness training efforts is largely dependent on how employees perceive the program. If staff members view it as another task that reduces their productivity and leads to more stress, they are likely to treat it like an unwelcome chore. That’s why positive employee attitudes are the bedrock of successful cybersecurity programs.
JOSHUA CRUMBAUGH
JOSHUA CRUMBAUGH
April 18, 2024
Consent Phishing: The Wolf in Sheep's Clothing
Cyber News

Consent Phishing: The Wolf in Sheep's Clothing

Consent phishing is a sneaky tactic where hackers pretend to be trustworthy apps or services to trick people into giving them permissions. Once they have these permissions, they can get into real cloud services and steal sensitive data. This post will explain what consent phishing is, how it works, and how to protect against it, with a focus on the innovative solutions provided by PhishFirewall.
JOSHUA CRUMBAUGH
November 2, 2023
Navigating the New NIST Training Guidelines: What You Need to Know
Cyber News

Navigating the New NIST Training Guidelines: What You Need to Know

Unpacking the NIST Cybersecurity Framework 2.0 Public Draft is like unboxing a new gadget—it’s the same but better. The proposed changes in the training requirements are subtle but pinpointed for clarity, trimming any room for misinterpretation. While most vendors miss the mark on role-based training, the new draft illuminates these gaps. Dive in to understand how these changes might be more significant than you think.
JOSHUA CRUMBAUGH
October 27, 2023
wormgpt: Combating AI-Driven BEC Attacks with AI-Powered Cybersecurity Solutions
Cyber News

wormgpt: Combating AI-Driven BEC Attacks with AI-Powered Cybersecurity Solutions

🚨 AI-driven BEC attacks are on the rise, with cybercriminals exploiting advanced tools like WormGPT to craft highly convincing phishing emails. Traditional security measures just won't cut it anymore. It's time to embrace PhishFirewall's innovative noLMS approach, gamified training, and AI cyber coaching to empower employees and stay ahead of these evolving threats. Let's redefine #cybersecurity training together! 💪 #PhishFirewall #BECattacks #AIDrivenCybersecurity
JOSHUA CRUMBAUGH
July 19, 2023
The Ch@ngeme! Conundrum: Strengthening Cybersecurity in Schools and Beyond
Cyber News

The Ch@ngeme! Conundrum: Strengthening Cybersecurity in Schools and Beyond

🚨 The Ch@ngeme! incident at a Michigan high school highlights the importance of cybersecurity awareness in schools & service providers. Top 5 best practices: 1️⃣ Strong password policies 2️⃣ Cybersecurity education for students & staff 3️⃣ Clear communication channels 4️⃣ Regular security assessments 5️⃣ Fostering a culture of security awareness
JOSHUA CRUMBAUGH
July 19, 2023
Pioneering Role-Based, Micro-Sized Cybersecurity Training for the Modern Workplace
Cyber News

Pioneering Role-Based, Micro-Sized Cybersecurity Training for the Modern Workplace

Discover PhishFirewall, the revolutionary cybersecurity training solution offering role-specific, time-efficient microlearning modules. Transform your team's cybersecurity awareness with our personalized, AI-enhanced approach. Make the switch to PhishFirewall. Redefine cybersecurity education in your organization.
CRYSTAL FONTAINE
June 15, 2023
Cybersecurity: Guardian or Tyrant? The Hidden Icebergs in Corporate Waters
Cyber News

Cybersecurity: Guardian or Tyrant? The Hidden Icebergs in Corporate Waters

Unchecked authority given to cybersecurity teams is a hidden iceberg posing potential threats to corporate harmony and functionality. Practices like punitive phishing simulations, imposing the 'my way or the highway' approach, fostering a superiority complex, and exploiting user trust can cause more harm than good. To foster a productive, respectful, and safe digital environment, organizations must balance their approach, allowing cybersecurity teams to serve as a collaborative force rather than an autocratic entity. PhishFirewall challenges these traditional practices, providing a non-punitive, gamified platform to create an atmosphere of continuous learning and mutual respect in the cyber realm, turning cybersecurity from a liability into an asset.
JOSHUA CRUMBAUGH
June 15, 2023
The AI Revolution: Transforming Customer Success in 2023
Cyber News

The AI Revolution: Transforming Customer Success in 2023

Explore the transformative role of AI in customer success in 2023. Learn how AI is reshaping business strategies and enhancing customer experience by predicting behavior, automating tasks, and extracting actionable insights from data.
CRYSTAL FONTAINE
June 7, 2023
Cybercrime Explosion: Navigating the PaaS Tsunami and the Lifeline of Security Training
Cyber News

Cybercrime Explosion: Navigating the PaaS Tsunami and the Lifeline of Security Training

Explore the challenges of rising cyber threats such as Phishing-as-a-Service and access brokers in our digital age. Discover the critical role of security awareness training and proactive defensive measures in combating these threats and ensuring a safe, secure digital ecosystem.
CRYSTAL FONTAINE
June 2, 2023
Choosing NoLMS over Traditional LMS: A Shift Towards Personalized Training
Cyber News

Choosing NoLMS over Traditional LMS: A Shift Towards Personalized Training

Discover why NoLMS is replacing traditional Learning Management Systems in cybersecurity training. Learn how AI, personalized learning pathways, micro-learning, role-based training, and advanced analytics are reshaping cybersecurity education.
JOSHUA CRUMBAUGH
May 24, 2023
Magnetic Attraction: A Woman's Tale of Machine Learning and New Technologies
Cyber News

Magnetic Attraction: A Woman's Tale of Machine Learning and New Technologies

Explore the fascinating intersection of artificial intelligence and materials science in 2023. Discover how machine learning is revolutionizing magnetic materials research, enhancing device performance, and redefining technological possibilities.
CRYSTAL FONTAINE
May 23, 2023
Don't Be a Cybersecurity Tool: Embrace the AI Revolution
Cyber News

Don't Be a Cybersecurity Tool: Embrace the AI Revolution

Cybersecurity has traditionally leaned on a range of tools to safeguard organizations from threats. However, these traditional approaches often lag behind the ever-evolving cyber threat landscape, with vulnerabilities arising from misconfigurations, improper usage, and reliance on human intervention. AI is set to revolutionize cybersecurity by automating threat detection and responses, allowing for faster and more precise actions. It minimizes human error, accelerates responses, and is able to learn and adapt from past incidents, thus offering a more dynamic and proactive defense system.
JOSHUA CRUMBAUGH
May 19, 2023
Breaking Through the Glass Firewall: A Deeper Dive into the Role of Women in Cybersecurity
Cyber News

Breaking Through the Glass Firewall: A Deeper Dive into the Role of Women in Cybersecurity

Explore the evolving landscape of cybersecurity through the lens of gender diversity. This article delves into the increasing role of women in cybersecurity, their significant contributions, and the importance of an inclusive future. Uncover how diversity strengthens digital defense and learn about the inspirational women leading the charge.
CRYSTAL FONTAINE
May 12, 2023
The Double-Edged Sword of AI in Ransomware: Savior or Saboteur
Cyber News

The Double-Edged Sword of AI in Ransomware: Savior or Saboteur

One of the most pressing questions is whether AI will be able to prevent ransomware attacks, or whether it will be used for ransomware attacks.
CRYSTAL FONTAINE
May 6, 2023
2023 CyberSecurity Predictions: An Escalation of Cyber Warfare
Cyber News

2023 CyberSecurity Predictions: An Escalation of Cyber Warfare

The threat from nation state threat actors will loom much larger in 2023 as the gloves come off between the market-based democracies and authoritarian adversaries like China, Russia, and Iran. Up to now the narrative about cybersecurity has mostly centered on criminal threats. Next year will bring greater attention to state-conducted and state-sponsored cyber espionage efforts and infrastructure attacks.
GREGORY SIMS
February 23, 2023
2023 CyberSecurity Predictions: AI vs AI – The Future of Cybersecurity
Cyber News

2023 CyberSecurity Predictions: AI vs AI – The Future of Cybersecurity

One of the biggest trends in cybersecurity expected in 2023 is the rise of AI-driven phishing attacks. These attacks are particularly dangerous because they use artificial intelligence to create customized, highly targeted messages that are designed to trick individuals into giving away sensitive information or clicking on malicious links.
JOSHUA CRUMBAUGH
February 14, 2023
Photo Representing how secure Huntsville is

Huntsville: A Beacon for Cybersecurity

Huntsville is a hub of technology and innovation, making it a lucrative target for cybersecurity threats. Learn How Phishfirewall Helps!
Read post
Joshua's interview with Business Insight

Cyber Security Executive 2022 | Joshua Crumbaugh, PhishFirewall | Business Insight Group

Phishfirewall's CEO Joshua discusses current phishing trends with the Business Insight Group!
Watch Now
Photo of Phishing Attack

How AI and Machine Learning are Changing the Phishing Game

Joshua discusses how AI and machine learning are redefining how the industry looks at phishing.
Read post

Learn Why World Leading Advisory Firm, Frost & Sullivan, Recommends Phishfirewall!

Strengthen your Security Awareness Training with Frost & Sullivan's white paper! Gain insights on why training is more effective when you employ an AI-powered SAT program to protect your business. Download this essential resource today!
We care about your data, learn more in our privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.