Adversary Universe Podcast
Podcast tekijän mukaan CrowdStrike - Torstaisin
45 Jaksot
-
A Deep Dive into DeepSeek and the Risks of Foreign LLMs
Julkaistiin: 20.2.2025 -
Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell
Julkaistiin: 6.2.2025 -
See You I-Soon: A Peek at China’s Offensive Cyber Operations
Julkaistiin: 16.1.2025 -
The Most Prolific Adversaries and Threats of 2024
Julkaistiin: 19.12.2024 -
Cross-Domain Attacks: Know Them, Find Them, Stop Them
Julkaistiin: 12.12.2024 -
LIMINAL PANDA and the Implications of Global Telco Targeting
Julkaistiin: 27.11.2024 -
Exploring Offensive Security with CrowdStrike Red Teamers
Julkaistiin: 7.11.2024 -
The Latest in China-Taiwan Cyber Tensions
Julkaistiin: 24.10.2024 -
How CrowdStrike Tracked INDRIK SPIDER from Origin to Takedown
Julkaistiin: 10.10.2024 -
Small But Mighty: The Kernel’s Essential Role in Cybersecurity Defense
Julkaistiin: 1.10.2024 -
Coming Soon to Las Vegas: Adversary Universe Previews #FalCon2024
Julkaistiin: 12.9.2024 -
Intern Spotlight: Starting A Cyber Career with CrowdStrike
Julkaistiin: 29.8.2024 -
Hunting the Rogue Insiders Operating for FAMOUS CHOLLIMA
Julkaistiin: 21.8.2024 -
Talking OT Security with Fernando Madureira, Global CISO of Cosan
Julkaistiin: 11.7.2024 -
How Adversaries Respond to Law Enforcement Takedowns
Julkaistiin: 27.6.2024 -
When the Adversary Knows They’re Caught
Julkaistiin: 13.6.2024 -
Unpacking China-India Cyber Tensions
Julkaistiin: 30.5.2024 -
Understanding Social Engineering with Shelly Giesbrecht, Director, Professional Services
Julkaistiin: 23.5.2024 -
Hacktivism and the JACKALs Behind It
Julkaistiin: 9.5.2024 -
Building a Strong Threat Hunting Program with Andrew Munchbach
Julkaistiin: 25.4.2024
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.