26 episodes

Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.

Adversary Universe Podcast CrowdStrike

    • Technology
    • 5.0 • 65 Ratings

Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.

    Building a Strong Threat Hunting Program with Andrew Munchbach

    Building a Strong Threat Hunting Program with Andrew Munchbach

    Andrew Munchbach, CrowdStrike’s VP of Global Enterprise Sales Engineering, joins Adam and Cristian in this week’s episode to explore what threat hunting is, how it works, and what makes a good threat hunting program.

    • 36 min
    Adversary Attribution: What It Means and How It Works

    Adversary Attribution: What It Means and How It Works

    Today’s conversation explores a common question around adversary activity: Why does attribution matter? When a cyberattack hits, why go to the trouble of learning who is behind it?

    • 49 min
    LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center

    LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center

    In this special episode of the Adversary Universe podcast, Adam and Cristian are joined by Morgan Adamski, Chief of the CCC and government security expert, onstage at CrowdStrike’s Gov Threat Summit in Washington, D.C.

    • 25 min
    CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career

    CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career

    CrowdStrike Chief Security Officer Shawn Henry joined CrowdStrike as employee number 19 after a 24-year career at the FBI, where he retired as the Bureau’s Executive Assistant Director.

    Today, he joins Adam and Cristian for a wide-ranging conversation exploring his early days at CrowdStrike and transition to the private sector, his perspective on the 2016 DNC breach and the risks modern elections face.

    • 44 min
    A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions

    A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions

    In this episode, Adam and Cristian reflect on the early days of the Global Threat Report and examine the key findings of this year’s report, which was released this week.

    • 35 min
    The Dark Personality Traits Fueling Cybercrime

    The Dark Personality Traits Fueling Cybercrime

    CrowdStrike has long said, “You don’t have a malware problem — you have an adversary problem.” Much like we analyze the malware and tools used in cyberattacks, we must also learn about the people who orchestrate them.Adam and Cristian are joined by Cameron Malin, a behavioral profiler who specializes in understanding adversaries and the “why” behind their activity. Cameron built the FBI’s Cyber Behavioral Analysis Unit, which works to understand the motivations for cybercrime across different types of offenses and has focused for years on exploring why adversaries do what they do. In this episode, he discusses how the discipline of cyber behavioral profiling emerged, how experts approach interviewing and analyzing adversaries, and the “dark triad” and “dark tetrad” of personality traits commonly observed in cyberattacks.

    • 45 min

Customer Reviews

5.0 out of 5
65 Ratings

65 Ratings

Hambeez ,

Great podcast

Love these, let’s keep it going.

2AirpodsNMe ,

Great Insights!

Fun and to the point. Keep ‘em coming!

Zachfau ,

Solid security podcast

Really good podcast reviewing last Intel trends

Top Podcasts In Technology

The Neuron: AI Explained
The Neuron
Lex Fridman Podcast
Lex Fridman
No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod

You Might Also Like

CyberWire Daily
N2K Networks
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Hacking Humans
N2K Networks
Cyber Security Headlines
CISO Series
Malicious Life
Malicious Life