Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
CrowdStrike Podcasts
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Chain of Events. Cause and Effect. We analyse what went right and what went wrong as we discover that many outcomes can be predicted, planned for and even prevented.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
D-Risk!: Smart Investing for the Real World Welcome to D-Risk!, the podcast that cuts through market hype to bring you clear, research-backed investing insights. Your host, with a background in finance and data, simplifies complex economic trends and stock analyses, focusing on strategy and clarity over quick tips. This is about making informed decisions to reduce risk and grow your money. While the voice is AI-generated for consistency, the analysis is 100% human-driven. Let's de-risk your ...
…
continue reading
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
…
continue reading
All areas of an organization, even those still in the analog world, are being transformed by technology. This shift isn't just modernizing manual processes with digital tools, but changing the fabric of an organization to support a new way of thinking. So while it may be a buzzword, digital transformation is happening and we're here to unpack it with you. Between big ideas and tiny details is the ten thousand foot view. Join the technology consultants from Vervint as we discuss the changing ...
…
continue reading
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
…
continue reading
Hosted by Betsy Sikma, this ongoing series of 15- to 20-minute podcasts is designed to break down complex topics that have a huge impact on life at Milliken.
…
continue reading
Security Boulevard Chats is the companion podcast to SecurityBoulevard.com. Hosted by long time cyber insiders, Techstrong CEO Alan Shimel and Techstrong CTO and GM Mitch Ashley discuss cyber-related topics making tomorrows headlines.
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
We make software-related technical topics intelligible. We aim to help you develop an intuitive understanding of each subject, instead of emphasizing formal definitions. Join us as we learn about the wide world of software.
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
Welcome to ”What the Shell?” where I dive into major hacks and vulnerabilities in a way meant to be accessible by anyone. Come with me as we look at each incident through an exciting lens of curiosity. Join us on our discord if you‘d like to participate in discussions with myself and our guests! https://discord.gg/bJauPBBhHn
…
continue reading
Robert, of SpaceAge Consulting LLC, gets Unwired and talks about the technology behind Audio and Video Production. He and his guests "Take the Technical and make it Understandable". Tune in weekly to hear more tech and tips about all things AV.
…
continue reading
Join us on a cybersecurity journey like no other! In our podcast, we dive into the dynamic world of cybersecurity, exploring the latest topics and trends. We blend insightful discussions with a touch of humor and real-world anecdotes to keep you informed, entertained, and one step ahead of the cyber threats lurking out there. Tune in for a unique blend of cybersecurity insights and a dash of 'BS' – because learning about security doesn't have to be dry and boring!
…
continue reading
The Testing Show explores, pokes and prods anything and everything related to testing, with new episodes released every other Wednesday. Our hosts, Matt Heusser and Michael Larsen, will analyze tried and true methodologies and practices against on trend and emerging topics. We have a range of guest contributors from Qualitest as well as industry experts from around the world to share insights, knowledge and personal experience. So take minute to find out what others are saying in the testing ...
…
continue reading
Two and a half engineers, three different viewpoints. At the intersection of technology, business, gaming and psychology, get a second opinion about the issues of the day in the tech industry. Each opinion is held only the host sharing it (and not by our employers). *Warning:* The host may no longer hold that opinion by the end of the episode.
…
continue reading
Welcome to Seed to Scale. The podcast where Eniac Ventures sits down with founders, investors, and influencers to discuss all things startups and seed stage. Each episode will be hosted by an Eniac General Partner - Hadley Harris, Nihal Mehta, Tim Young or Vic Singh - to talk about the ups and downs of building an early-stage company, securing funding and what it takes to build a lasting business. Send topics or guest suggestions to [email protected] or @seedtoscale, and please subscribe, ...
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading
There's a lot on the line for developers. Writing clean code, tracking down and removing bugs, AND shipping features to millions of customers? It's a lot—and devs are people too! The Dev Morning Show (At Night) shares the human side of software development with interviews that start lighthearted but get to the heart of what it takes to perform in the delightfully weird world of software. Join us on the journey!
…
continue reading
CrowdStrike are the global leaders in cybersecurity whose innovative technology and mission to keep their customers protected from attack is disrupting the industry. A Formula For Success features leaders from across the globe discussing their journey to success and how they build a winning culture within their organizations. We sit down with leaders to talk about the technological innovations that are driving their industries as well as diving deeper into what drives these individuals to su ...
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
The X – The Experience – is singlehandedly the most important factor in the success of products, services and entire businesses. The X is hosted by Silicon Valley veterans and product innovation strategists Bryan McClain and Demetrius Madrigal, who bring a combined 30+ years of experience studying human behavior and technology. They’ve been behind the scenes with everyone from unfunded startups to technology giants and have a unique perspective on current events, how they are shaped by the h ...
…
continue reading
The Ungrowth Show is a captivating podcast that explores the real-world challenges and triumphs of businesses. Hosted by TrellisPoint, each episode dives into the complex battles companies face, from overcoming market hurdles to achieving breakthrough successes. With expert commentary and engaging storytelling, we dissect these business stories to reveal valuable lessons and insights that help others avoid making mistakes. Whether you’re navigating your own business journey or simply interes ...
…
continue reading

1
CrowdStrike Holdings, Inc. (CRWD) - Episode 11 - August 28, 2025
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47On this episode of D-Risk, we dive into the latest market shake-up, analyzing why leading cybersecurity company CrowdStrike (CRWD) faced a significant after-hours drop despite a stellar earnings beat. We break down the fundamental conflict between strong past performance and cautious future guidance, examining the bearish technical trends, market s…
…
continue reading

1
Ep. 18: Dmitri Alperovitch, Co-founder Crowdstrike Part 2
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36In this episode of Code and Country, Ian Paterson continues his conversation with Dmitri Alperovitch, CrowdStrike co-founder, Silverado Policy Accelerator executive chairman, and author of World on the Brink. Dmitri explains how China’s Volt Typhoon campaign marks a shift from espionage to battlefield preparation by infiltrating water utilities, sm…
…
continue reading

1
Cloud Intrusions Rise, eCrime Thrives, Governments Under Attack: CrowdStrike 2025 Threat Hunting Report
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02In the first half of 2025 alone, cloud intrusions were up 136% compared to all of 2024. China was a big driver — CrowdStrike saw a 40% year-over-year surge in intrusions from suspected cloud-conscious China-nexus threat actors. In the government sector, interactive intrusions increased 71%, and targeted intrusion activity jumped 185%. The CrowdStri…
…
continue reading

1
D-Wave Quantum Inc. (QBTS) - Episode 14 - Aug 29, 2025
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27Get ready for a deep dive into the fascinating world of stock analysis with D-Risk! In this episode, we're putting D-Wave Quantum (QBTS) under the microscope. We'll explore why Wall Street analysts are bullish on this quantum computing innovator, while the cold, hard numbers on its balance sheet tell a very different, and potentially terrifying, st…
…
continue reading

1
Rigetti Computing, Inc. (RGTI) - Episode 14 - Aug 29, 2025
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00On this episode of D-Risk, we dissect the high-stakes world of Rigetti Computing (RGTI), a stock that embodies the tension between a compelling futuristic story and a challenging financial reality. We break down the trifecta of recent bullish news, a new partnership, a powerful quantum computer launch, and a massive capital raise, that has captivat…
…
continue reading

1
Intel Corporation (INTC) - Episode 13 - August 28, 2025
7:01
7:01
Play later
Play later
Lists
Like
Liked
7:01On this episode of D-Risk, we dissect the latest Intel (INTC) news: a historic $8.9 billion agreement with the U.S. government that puts the company at the heart of a national strategy. We explore the powerful, long-term implications of this deal versus the immediate skepticism from Wall Street analysts and a conflicting technical picture. Join us …
…
continue reading

1
Snowflake Inc. (SNOW) - Episode 12 - August 28, 2025
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35On this episode of D-Risk, we analyze why Snowflake (SNOW) is experiencing a post-earnings blizzard of investor enthusiasm. We break down the conflict between the company's spectacular revenue and earnings beat and its stretched valuation. With a deep dive into the massive surge of buying volume, shifting technical indicators, and bullish sentiment…
…
continue reading

1
Tesla, Inc. (TSLA) - Episode 10 - August 27, 2025
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57On this episode of D-Risk, we analyze Tesla's stock, asking if its powerful rally is fueled by innovation or just a cloud of hype. We cut through the noise, contrasting the company's strong PR and operational momentum with a troubling long-term valuation that has Wall Street analysts cautious. While the macro environment is hesitant, market sentime…
…
continue reading

1
SoFi Technologies, Inc. (SOFI) - Episode 9 - August 27, 2025
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41On this episode of D-Risk, we dissect SoFi Technologies, a fintech stock that has surged over 240% in a year, to determine if its rally has staying power. We explore the central conflict between the company's strong operational momentum and a valuation that our models suggest is far too high. The analysis dives into a divided Wall Street, a bullish…
…
continue reading

1
Opendoor Technologies (OPEN) - Episode 8 - August 27,2025
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23This episode of D-Risk offers a no-nonsense breakdown of Opendoor Technologies (OPEN) for August 27, 2025. We analyze the stock's massive disconnect between a grim fundamental valuation and its powerful, momentum-fueled rally. We explore the deep divide in market sentiment—highly bullish options activity versus a huge number of short-sellers—and br…
…
continue reading
A leaking flexible pipe started a fire in the Engine Room aboard the Carnival Triumph during its return journey from Mexico in early 2013. The fire caused minor damage in one, very important section of the Engine Room leading to a total loss of Mains Power. With only intermittent Emergency Power and over 4,000 people on board the ship drifted with …
…
continue reading

1
NVIDIA Corporation (NVDA) - Episode 7 - August 26, 2025
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18In today's episode, D-Risk analyzes the tense setup in NVIDIA's stock just one day before its critical earnings report. The company is a bundle of contradictions: it's rolling out a blitz of groundbreaking product innovations and enjoys overwhelmingly bullish sentiment from options traders, with short-sellers nowhere in sight. However, this optimis…
…
continue reading

1
Palantir Technologies Inc. (PLTR) - Episode 6 - Aug 26,2025
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21In today's episode (August 26, 2025), D-Risk tackles one of the market's most divisive stocks: Palantir. We explore the massive conflict between the company's powerful narrative and its concerning numbers. On one side, you have a beloved AI leader with bullish analyst ratings and optimistic market sentiment. On the other, you have a fundamental val…
…
continue reading

1
Meta Platforms, Inc. (META) - Episode 5 - Aug 26, 2025
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33In today's episode (August 26, 2025), D-Risk dives into the conflicting signals surrounding Meta Platforms. The company's powerfully bullish fundamentals, backed by glowing analyst ratings, are clashing directly with a weakening short-term technical picture that suggests caution. Is this a classic buy-the-dip opportunity or a warning sign for what'…
…
continue reading

1
Live at Black Hat: What’s AI Really Capable Of?
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45This year at Black Hat, the topic of AI was everywhere — from hallway chats to the expo floor. Adam and Cristian took a break from the action for a rare in-person conversation about how adversaries are weaponizing AI, how defenders are using agentic AI, and what we should all be thinking about as AI evolves as an offensive and defensive tool. The A…
…
continue reading

1
Rewilding the Internet with Maria Farrell
1:05:17
1:05:17
Play later
Play later
Lists
Like
Liked
1:05:17This week Gus and Caitlin are rewilding the Internet with Maria Farrell. What do you want using the internet or your devices to feel like? What can ecology teach us about unwinding corporate capture of the digital commons? How do we take back our home online? Links Links- Maria's original rewilding article in Noema: https://www.noemamag.com/we-need…
…
continue reading

1
Ep. 17: Dmitri Alperovitch, Co-founder Crowdstrike Part 1
21:31
21:31
Play later
Play later
Lists
Like
Liked
21:31In this episode of Code and Country, Ian Paterson sits down with Dmitri Alperovitch, CrowdStrike co-founder, Silverado Policy Accelerator executive chairman, and author of World on the Brink. Dmitri shares his journey from teenage encryption entrepreneur to leading some of the most consequential cyber investigations in history, including Operation …
…
continue reading

1
236 - The Hidden Danger in Your Cloud-Why Misconfiguration Is the Real Vulnerability
30:31
30:31
Play later
Play later
Lists
Like
Liked
30:31Enjoying the content? Let us know your feedback! Today we’re tackling a critical subject that causes countless data breaches yet often gets misunderstood: misconfiguration — what it is, why it’s different from a software vulnerability, and why it remains one of the biggest security risks organizations face. One quick reminder before we dive into th…
…
continue reading

1
Future-Proofing IoT: Migration, Modernization & AWS Insights
37:47
37:47
Play later
Play later
Lists
Like
Liked
37:47In this episode of 10,000 Feet, host Richelle Lentz is joined by Rick Krause from Vervint and Daniel Gross from AWS to explore the evolving landscape of connected products and IoT platforms. Together, they unpack the journey from early, DIY-style IoT implementations to today’s scalable, secure, and cloud-native solutions powered by AWS. The convers…
…
continue reading
Ready to cut through the noise on Meta Platforms (META)? On this episode of D-Risk, we provide a deep, data-driven look at the company. We dissect its recent financial performance and compare its valuation to the broader industry. Then, we switch to the charts, analyzing everything from Bollinger Bands and VWAP to moving averages and momentum indic…
…
continue reading
Welcome to D-Risk!, where we cut through the noise with a no-nonsense analysis of NVIDIA Corporation, based on our research and data as of July 20, 2025. In this episode, we deliver a comprehensive review of the semiconductor giant, examining its financial health, market position, and future prospects. We highlight NVIDIA's dominant market position…
…
continue reading
Welcome to D-Risk!, where we cut through the noise with a no-nonsense analysis of AMD, based on our research and data as of July 5, 2025. In this episode, we reveal our "Hold with a Bullish Lean" recommendation for the semiconductor giant. We dive into AMD's impressive financial rebound, its strategic position in the booming AI and data center mark…
…
continue reading
Welcome to D-Risk!, the podcast that cuts through market hype to bring you clear, research-backed investing insights. Your host, with a background in finance and data, simplifies complex economic trends and stock analyses, focusing on strategy and clarity over quick tips. This is about making informed decisions to reduce risk and grow your money. W…
…
continue reading

1
235 - The Microsoft SharePoint vulnerability
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51Enjoying the content? Let us know your feedback! Today, we focus on a critical and rapidly evolving Microsoft SharePoint vulnerability that’s rocked the security world in July 2025. We’ll walk you through what it is, why it matters, how attackers exploit it, and most importantly, what you and your organization can do to defend against it. For those…
…
continue reading
Ollie Whitehouse, CTO of the UK’s National Cyber Security Centre (NCSC), joins Code and Country to unpack what it really takes to secure a nation in the age of AI, ransomware, and quantum threats. Drawing from three decades of experience across public and private sectors, Whitehouse offers a candid assessment of the broken cybersecurity market, why…
…
continue reading

1
234 - Protecting the Invisible-How to Secure Infrastructure without Agents
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49Enjoying the content? Let us know your feedback! The world of cybersecurity isn’t just about defending laptops and servers—it’s also about safeguarding the “invisible” corners of our networks: those printers, cameras, routers, and dozens of other devices that quietly power our organizations. But what do you do when you can’t install security softwa…
…
continue reading

1
233 - CI-CD Pipelines and Associated Security Risks
27:33
27:33
Play later
Play later
Lists
Like
Liked
27:33Enjoying the content? Let us know your feedback! In this week's episode, we talk through the technical details of CI/CD (Continuous Integration/Continuous Development) pipelines: what they are, how they work, the jargon around them, and the potential security risks organizations need to be aware of. Finally, we’ll bust a persistent myth in software…
…
continue reading

1
Cycles of Control: Reproductive rights and digital risks
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13This week we're talking to Martha Dimitratou from ReproUncensored, and PI's own Sarah Simms about the international landscape for reproductive rights, and including barriers to access to reproductive healthcare, including abortion; and how big tech are collaborating with or supporting tactics to make access to healthcare harder. Links - Learn more …
…
continue reading
They never really left — they just got quieter, faster, and bolder. In this episode of the Adversary Universe podcast, Adam and Cristian trace the resurgence of SCATTERED SPIDER, one of today’s most aggressive and sophisticated adversary groups. Once known for SIM swapping and gaming community exploits, SCATTERED SPIDER has evolved into a high-spee…
…
continue reading

1
Korfuzi, Insider Trading & Money Laundering
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13Insider trading, money laundering, and reputational risk in asset management take centre stage in this episode, featuring the recent conviction of Redinel and Oerta Korfuzi. David Masters and Neil Robson examine how confidential market information was exploited, how the FCA uncovered the scheme, and why the asset manager involved avoided lasting re…
…
continue reading

1
Ep 15: Katie Moussouris, CEO Luta Security
40:08
40:08
Play later
Play later
Lists
Like
Liked
40:08Katie Moussouris, founder and CEO of Luta Security, joins Code and Country to trace her path from MIT to pioneering vulnerability disclosure and launching “Hack the Pentagon.” She dives deep into the economics of the exploit market, the dangers of vulnerability disclosure laws, and how AI is shifting the dynamics of cybersecurity offense and defens…
…
continue reading
Enjoying the content? Let us know your feedback! Today’s episode takes you through three intersecting stories revealing how technology shapes both our vulnerabilities and our digital identity—from the sprawling and adaptable threat of AsyncRAT malware, to critical Bluetooth vulnerabilities threatening millions of vehicles globally, and finally to a…
…
continue reading

1
231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15Enjoying the content? Let us know your feedback! Today, we’re focusing on the critical lessons from one of the most disruptive IT failures in recent memory: the global outage triggered by a CrowdStrike software update on July 19, 2024. While the headlines focused on grounded flights and downed systems, the real story lies in what this incident reve…
…
continue reading

1
EP. 31 - AI in Manufacturing, Tariff Impacts, and Smarter Supply Chains
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13In this episode, Brad Bussie and field CISO Mark Aksel explore how AI is transforming manufacturing, from predictive maintenance to advanced supply chain strategies. They break down the real impacts of tariffs and share how companies can future-proof operations with smarter AI-driven decisions. ## Topics Covered * Using AI for predictive maintenanc…
…
continue reading

1
Ask Us (Almost) Anything: Threat Intel, Adversaries, and More
25:13
25:13
Play later
Play later
Lists
Like
Liked
25:13You asked, and we answered. This episode of the Adversary Universe podcast takes a deep dive into questions from our listeners. What did you want to know? Well, a lot about adversaries, but also about career paths and the threat intel space. Tune in to hear the answers to questions like: • How did you break into the threat intelligence space? • Who…
…
continue reading
Enjoying the content? Let us know your feedback! This week on YusufOnSecurity, we’re diving into a topic that’s become increasingly critical as our world grows more connected: the security of the Internet of Things, or IoT. From smart thermostats and wearable fitness trackers to industrial sensors and connected cars, IoT devices are now woven into …
…
continue reading
Enjoying the content? Let us know your feedback! In today’s interconnected world, the security of our digital infrastructure relies heavily on cryptography—the science of protecting information by transforming it into unreadable formats for unauthorized users. But how do we know the cryptographic solutions we use are truly secure? That’s where stan…
…
continue reading
Physical security and IT security have gone hand in hand for a long time. While cybersecurity teams are rightfully focused on protecting their virtual environments, they should also have an eye on whether an adversary is walking through the front door. “Anytime there’s a physical boundary, an adversary is going to look to cross over that — whether …
…
continue reading

1
Ep 14: Robert Young Pelton Author, Journalist, Explorer
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43In this episode of Code and Country, host Ian Paterson is joined by Robert Young Pelton, renowned war correspondent and author of Licensed to Kill and The World's Most Dangerous Places. Pelton shares firsthand accounts from his time embedded with the Taliban, Special Forces in Afghanistan, and rebel groups in Chechnya. He discusses the evolution of…
…
continue reading

1
228 - How the Emergence of AI-Powered Malware works
26:19
26:19
Play later
Play later
Lists
Like
Liked
26:19Enjoying the content? Let us know your feedback! In today’s episode is about a seismic shift in the world of cyber threats. The emergence of AI-powered malware. We’ll unpack how this new breed of malware works, the science behind it, real-world incidents, and what the latest academic research reveals. We will also look at the latest news that some …
…
continue reading

1
Learning about learners: Protecting Children's Data
56:59
56:59
Play later
Play later
Lists
Like
Liked
56:59This week we speak to Jen Persson, Director of Defend Digital Me, about the technologies being deployed in schools in England and Wales. Links: Read more from Defend Digital Me: https://defenddigitalme.org/research/ PI's work on Securitising Education: https://privacyinternational.org/campaigns/securitising-education 25 Years old - The Database Sta…
…
continue reading
Enjoying the content? Let us know your feedback! Today, we’ll answer a pressing question in cybersecurity: Is UTM still relevant in 2025? We’ll trace the origins of UTM, explain why it was created, break down its core features, compare it to newer technologies, and finish by busting a common cybersecurity myth. Before we dive into our main topic, l…
…
continue reading
Would you rather have an adversary profile you based on your AI chat history or tell your AI chatbot to forget everything it knows about you? That’s one of many questions Adam and Cristian explore in this episode on how adversaries are integrating AI into cyberattacks. These days, it seems AI is everywhere — and that includes the adversary’s toolbo…
…
continue reading

1
Ep 13: Andrew Amaro, Former CSIS Ops Lead
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14What do spies, skateboarders, and startups have in common? Security. In this episode of Code and Country, former CSIS technical ops lead Andrew Amaro shares how his background in physical infiltration and cyber operations shaped his approach to enterprise security. We cover why insider threats remain the most overlooked risk, how physical access is…
…
continue reading

1
226 - Inside A Stealthy Malware Powering Modern Cyber Attacks
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28Enjoying the content? Let us know your feedback! In this week's episode, we get into some detailed exploration of an up and coming malware. Looking at it closer, it is one of the most advanced post-exploitation code families shaping the cybersecurity landscape in 2025. Over the time we have together, we’ll unravel what this malware is, how it works…
…
continue reading

1
Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them. So, who are they? SCATTERED SPIDER and LABYRINTH CHOLLIMA are two of the …
…
continue reading

1
225 - What Is a Content Delivery Network—And Do They Really Protect Businesses?
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29Enjoying the content? Let us know your feedback! This week we are exploring what Content Delivery Networks —commonly known as CDNs— are and whether they protect modern businesses. We’ll dive deep into the mechanics of how CDNs work, the technologies behind them, and whether they defend organizations from threats or just deliver content at blazing s…
…
continue reading