The Defender's Advantage Podcast
Un pódcast de Mandiant
164 Episodo
-
What to Watch For in 2025
Publicado: 28/2/2025 -
Signals of Trouble
Publicado: 19/2/2025 -
Agentic AI in Cybersecurity
Publicado: 5/2/2025 -
The Art of Remediation in Incident Response
Publicado: 2/12/2024 -
How to Run an Effective Tabletop Exercise
Publicado: 18/10/2024 -
Using LLMs to Analyze Windows Binaries
Publicado: 4/10/2024 -
How Threat Actors Bypass Multi-Factor Authentication
Publicado: 26/9/2024 -
TAG's Work Tracking Commercial Surveillance Vendors
Publicado: 4/9/2024 -
What Iranian Threat Actors Have Been Up To This Year
Publicado: 25/7/2024 -
Mandiant's Approach to Securely Using AI Solutions
Publicado: 27/6/2024 -
Lessons Learned from Responding to Cloud Compromises
Publicado: 3/6/2024 -
The ORB Networks
Publicado: 22/5/2024 -
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
Publicado: 16/5/2024 -
M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher
Publicado: 29/4/2024 -
Assessing the State of Multifaceted Extortion Operations
Publicado: 11/4/2024 -
Hunting for "Living off the Land" Activity
Publicado: 29/3/2024 -
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024
Publicado: 14/3/2024 -
The North Korean IT Workers
Publicado: 21/2/2024 -
Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO
Publicado: 7/2/2024 -
Is The CTI Lifecycle Due For An Update?
Publicado: 25/1/2024
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: Listen to Kevin Bordlemay each month for this series focusing on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security.
