Adversary Universe Podcast
Un podcast de CrowdStrike
Catégories:
32 Épisodes
-
Talking OT Security with Fernando Madureira, Global CISO of Cosan
Publié: 11/07/2024 -
How Adversaries Respond to Law Enforcement Takedowns
Publié: 27/06/2024 -
When the Adversary Knows They’re Caught
Publié: 13/06/2024 -
Unpacking China-India Cyber Tensions
Publié: 30/05/2024 -
Understanding Social Engineering with Shelly Giesbrecht, Director, Professional Services
Publié: 23/05/2024 -
Hacktivism and the JACKALs Behind It
Publié: 09/05/2024 -
Building a Strong Threat Hunting Program with Andrew Munchbach
Publié: 25/04/2024 -
Adversary Attribution: What It Means and How It Works
Publié: 11/04/2024 -
LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center
Publié: 28/03/2024 -
CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career
Publié: 14/03/2024 -
A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions
Publié: 22/02/2024 -
The Dark Personality Traits Fueling Cybercrime
Publié: 15/02/2024 -
Demystifying North Korea: Why the "Hermit Kingdom" Is a Cyber Threat to Watch
Publié: 01/02/2024 -
AI Through the Defender’s Lens: A Chat with CrowdStrike’s Global CTO
Publié: 18/01/2024 -
Inside Russia’s Laboratory of Cyber Operations — and Beyond
Publié: 11/01/2024 -
Adversary Universe: 2023 Highlights
Publié: 28/12/2023 -
Inside the ”Alphabet Soup” of Incident Reporting Regulations
Publié: 14/12/2023 -
Data Extortion Dethrones Ransomware as the Threat to Watch
Publié: 30/11/2023 -
Urgent Care Required: The State of Healthcare Cybersecurity
Publié: 16/11/2023 -
Iran’s Rise from Nascent Threat Actor to Global Adversary
Publié: 09/11/2023
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.