The Defender's Advantage Podcast
Un podcast de Mandiant
164 Épisodes
-
What to Watch For in 2025
Publié: 28/02/2025 -
Signals of Trouble
Publié: 19/02/2025 -
Agentic AI in Cybersecurity
Publié: 05/02/2025 -
The Art of Remediation in Incident Response
Publié: 02/12/2024 -
How to Run an Effective Tabletop Exercise
Publié: 18/10/2024 -
Using LLMs to Analyze Windows Binaries
Publié: 04/10/2024 -
How Threat Actors Bypass Multi-Factor Authentication
Publié: 26/09/2024 -
TAG's Work Tracking Commercial Surveillance Vendors
Publié: 04/09/2024 -
What Iranian Threat Actors Have Been Up To This Year
Publié: 25/07/2024 -
Mandiant's Approach to Securely Using AI Solutions
Publié: 27/06/2024 -
Lessons Learned from Responding to Cloud Compromises
Publié: 03/06/2024 -
The ORB Networks
Publié: 22/05/2024 -
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
Publié: 16/05/2024 -
M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher
Publié: 29/04/2024 -
Assessing the State of Multifaceted Extortion Operations
Publié: 11/04/2024 -
Hunting for "Living off the Land" Activity
Publié: 29/03/2024 -
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024
Publié: 14/03/2024 -
The North Korean IT Workers
Publié: 21/02/2024 -
Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO
Publié: 07/02/2024 -
Is The CTI Lifecycle Due For An Update?
Publié: 25/01/2024
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: Listen to Kevin Bordlemay each month for this series focusing on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security.
