Lïa Desmousseaux de Givré

Lïa Desmousseaux de Givré

About Lïa Desmousseaux de Givré

A social engineering analyst, Lïa writes about a variety of topics at the core of Arsen’s mission: helping companies better protect themselves against the risk of social engineering attacks.

Lïa conducts her own research on a wide range of subjects related to cybersecurity and human factors, with a touch of AI, and publishes her articles on our blog.

Read our editorial standards and transparency page for editorial and corrections information.

Lïa Desmousseaux de Givré Latest Posts

Social Engineering Examples: Real-World Tactics

Social Engineering Examples: Real-World Tactics

How can you protect your organization from social engineering attacks and their adverse impacts? This article explores different attack strategies, real-world examples, and prevention methods.

Domain Doppelgängers: Protecting Against Domain Spoofing

Domain Doppelgängers: Protecting Against Domain Spoofing

Cybersecurity threats continue to evolve, and one of the rising concerns for businesses is the domain doppelganger. These deceptive domains are crafted to mimic legitimate websites, luring...

AIDS Trojan Analysis: Early Malware Case Study

AIDS Trojan Analysis: Early Malware Case Study

The AIDS Trojan, also known as the AIDS Information Diskette Trojan, is widely recognized as one of the earliest examples of ransomware* Its appearance in 1989 shocked the nascent world of...

Remote Access Trojan: What It Is & How to Detect It

Remote Access Trojan: What It Is & How to Detect It

Remote Access Trojans (RATs) are a dangerous form of malware that allows cybercriminals to gain unauthorized access and control over an infected computer or network. Understanding the risks posed...

Ransomware Simulator: Testing Your Defenses

Ransomware Simulator: Testing Your Defenses

In today's cybersecurity landscape, ransomware remains a top threat to organizations of all sizes. A ransomware attack can lock down your systems, encrypt your data, and demand a hefty ransom for...

Locky Ransomware Explained: Protection Strategies

Locky Ransomware Explained: Protection Strategies

Locky ransomware is a notorious form of malware that emerged in 2016, targeting businesses and individuals alike. This sophisticated ransomware spreads primarily through malicious email...

WannaCry Ransomware Attack: A Case Study

WannaCry Ransomware Attack: A Case Study

The WannaCry ransomware attack, which occurred in May 2017, stands as one of the most significant and destructive cyberattacks in recent history. It serves as a critical lesson for organizations...

Ransomware Definition: What is it & How to Secure your Data?

Ransomware Definition: What is it & How to Secure your Data?

Ransomware is one of the most prominent cyber threats today, targeting both individuals and organizations alike. In this article, we will dive into the ransomware definition, how it works, and the...

Ransomware Attacks: Effective Defense Strategies

Ransomware Attacks: Effective Defense Strategies

Ransomware attacks have rapidly become one of the most disruptive forms of cybercrime, targeting businesses of all sizes. By encrypting valuable data and demanding a ransom for its release, these...

Compliance Risk: Identification and Mitigation

Compliance Risk: Identification and Mitigation

In today's highly regulated business landscape, compliance risk is a critical concern for organizations across industries. Failing to comply with laws and regulations can result in severe...

Compliance Monitoring: Ensuring Policy Adherence

Compliance Monitoring: Ensuring Policy Adherence

Effective compliance monitoring is critical for ensuring that organizations consistently adhere to internal policies and regulatory requirements. As companies face increasing scrutiny from...

Compliance Management: Effective Strategies

Compliance Management: Effective Strategies

Effective compliance management is essential for organizations to meet legal obligations, protect their reputation, and maintain operational integrity. As regulations evolve, businesses must adopt...