Dror  Liwer

Interviews with Dror  Liwer RSS Feed

Dror Liwer joins Jim Blasingame to reveal that phishing is a way cyber-criminals catch you in their “net” as they send emails you may be tempted to open, which would allow the bad guys to enter your digital and online world.
Dror Liwer joins Jim Blasingame to reveal how unlike phishing, where cyber-criminals cast a wide net for victims, spear phishing is where you are being targeted individually, because the bad guys believe your network has significant value.
Dror Liwer joins Jim Blasingame to reveal how a digital security program like his protects users like you from becoming a victim of spear phishing attacks that have the potential to negatively impact the future of your business.
Dror Liwer joins Jim Blasingame to reveal that more larger businesses are going to require their vendors to provide evidence of cyber-security capability as a requirement to continue to do business.
Dror Liwer joins Jim Blasingame to reveal how cyber-criminals are getting through smaller firms to get to their larger customers, and how to prevent such an event from taking your business down.
Dror Liwer joins Jim Blasingame to discuss the challenges businesses of all sizes face in the cyber-security war, and how to be proactive in making larger customers comfortable with your cyber-security compliance.
Dror Liwer joins Jim Blasingame to reveal that more larger businesses are going to require their vendors to provide evidence of cyber-security capability as a requirement to continue to do business.
Dror Liwer joins Jim Blasingame to reveal how cyber-criminals are getting through smaller firms to get to their larger customers, and how to prevent such an event from taking your business down.
Dror Liwer joins Jim Blasingame to discuss the challenges businesses of all sizes face in the cyber-security war, and how to be proactive in making larger customers comfortable with your cyber-security compliance.
Dror Liwer joins Jim Blasingame to report on examples of how cyber criminals have assaulted organizations and extracted ransom money from them, and how to prevent this from happening to you.