Adversary Universe Podcast
Un pódcast de CrowdStrike
Categorías:
42 Episodo
-
The Most Prolific Adversaries and Threats of 2024
Publicado: 19/12/2024 -
Cross-Domain Attacks: Know Them, Find Them, Stop Them
Publicado: 12/12/2024 -
LIMINAL PANDA and the Implications of Global Telco Targeting
Publicado: 27/11/2024 -
Exploring Offensive Security with CrowdStrike Red Teamers
Publicado: 7/11/2024 -
The Latest in China-Taiwan Cyber Tensions
Publicado: 24/10/2024 -
How CrowdStrike Tracked INDRIK SPIDER from Origin to Takedown
Publicado: 10/10/2024 -
Small But Mighty: The Kernel’s Essential Role in Cybersecurity Defense
Publicado: 1/10/2024 -
Coming Soon to Las Vegas: Adversary Universe Previews #FalCon2024
Publicado: 12/9/2024 -
Intern Spotlight: Starting A Cyber Career with CrowdStrike
Publicado: 29/8/2024 -
Hunting the Rogue Insiders Operating for FAMOUS CHOLLIMA
Publicado: 21/8/2024 -
Talking OT Security with Fernando Madureira, Global CISO of Cosan
Publicado: 11/7/2024 -
How Adversaries Respond to Law Enforcement Takedowns
Publicado: 27/6/2024 -
When the Adversary Knows They’re Caught
Publicado: 13/6/2024 -
Unpacking China-India Cyber Tensions
Publicado: 30/5/2024 -
Understanding Social Engineering with Shelly Giesbrecht, Director, Professional Services
Publicado: 23/5/2024 -
Hacktivism and the JACKALs Behind It
Publicado: 9/5/2024 -
Building a Strong Threat Hunting Program with Andrew Munchbach
Publicado: 25/4/2024 -
Adversary Attribution: What It Means and How It Works
Publicado: 11/4/2024 -
LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center
Publicado: 28/3/2024 -
CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career
Publicado: 14/3/2024
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.