Adversary Universe Podcast
Ein Podcast von CrowdStrike - Donnerstags
45 Folgen
-
Adversary Attribution: What It Means and How It Works
Vom: 11.4.2024 -
LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center
Vom: 28.3.2024 -
CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career
Vom: 14.3.2024 -
A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions
Vom: 22.2.2024 -
The Dark Personality Traits Fueling Cybercrime
Vom: 15.2.2024 -
Demystifying North Korea: Why the "Hermit Kingdom" Is a Cyber Threat to Watch
Vom: 1.2.2024 -
AI Through the Defender’s Lens: A Chat with CrowdStrike’s Global CTO
Vom: 18.1.2024 -
Inside Russia’s Laboratory of Cyber Operations — and Beyond
Vom: 11.1.2024 -
Adversary Universe: 2023 Highlights
Vom: 28.12.2023 -
Inside the ”Alphabet Soup” of Incident Reporting Regulations
Vom: 14.12.2023 -
Data Extortion Dethrones Ransomware as the Threat to Watch
Vom: 30.11.2023 -
Urgent Care Required: The State of Healthcare Cybersecurity
Vom: 16.11.2023 -
Iran’s Rise from Nascent Threat Actor to Global Adversary
Vom: 9.11.2023 -
Inside China’s Evolution as a Global Security Threat
Vom: 2.11.2023 -
Have You Been Breached?
Vom: 19.10.2023 -
The Rise of the Access Brokers
Vom: 5.10.2023 -
Inside the AI, Cloud and Platform Innovations Previewed at Fal.Con 2023
Vom: 29.9.2023 -
Adversaries and AI: Today’s Reality and Tomorrow’s Potential
Vom: 21.9.2023 -
Ransomware Actors Mark Their Calendars for Back-to-School
Vom: 7.9.2023 -
Invisible Threats: Discovering, Tracking and Mitigating Vulnerabilities
Vom: 24.8.2023
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.