Adversary Universe Podcast
A podcast by CrowdStrike - Joi
45 Episoade
-
Adversary Attribution: What It Means and How It Works
Publicat: 11.04.2024 -
LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center
Publicat: 28.03.2024 -
CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career
Publicat: 14.03.2024 -
A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions
Publicat: 22.02.2024 -
The Dark Personality Traits Fueling Cybercrime
Publicat: 15.02.2024 -
Demystifying North Korea: Why the "Hermit Kingdom" Is a Cyber Threat to Watch
Publicat: 01.02.2024 -
AI Through the Defender’s Lens: A Chat with CrowdStrike’s Global CTO
Publicat: 18.01.2024 -
Inside Russia’s Laboratory of Cyber Operations — and Beyond
Publicat: 11.01.2024 -
Adversary Universe: 2023 Highlights
Publicat: 28.12.2023 -
Inside the ”Alphabet Soup” of Incident Reporting Regulations
Publicat: 14.12.2023 -
Data Extortion Dethrones Ransomware as the Threat to Watch
Publicat: 30.11.2023 -
Urgent Care Required: The State of Healthcare Cybersecurity
Publicat: 16.11.2023 -
Iran’s Rise from Nascent Threat Actor to Global Adversary
Publicat: 09.11.2023 -
Inside China’s Evolution as a Global Security Threat
Publicat: 02.11.2023 -
Have You Been Breached?
Publicat: 19.10.2023 -
The Rise of the Access Brokers
Publicat: 05.10.2023 -
Inside the AI, Cloud and Platform Innovations Previewed at Fal.Con 2023
Publicat: 29.09.2023 -
Adversaries and AI: Today’s Reality and Tomorrow’s Potential
Publicat: 21.09.2023 -
Ransomware Actors Mark Their Calendars for Back-to-School
Publicat: 07.09.2023 -
Invisible Threats: Discovering, Tracking and Mitigating Vulnerabilities
Publicat: 24.08.2023
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.