18 subscribers
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية


1 Favorite Grown-Up Moments from Season 3 40:54
The Defender's Advantage Podcast
Manage series 2915098
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
172 حلقات
Manage series 2915098
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
172 حلقات
كل الحلقات
×
1 AI Tools and Sentiment Within the Underground Cyber Crime Community 25:44

1 Protecting the Core: Securing Protection Relays in Modern Substations 43:05




1 UNC5221 and The Targeting of Ivanti Connect Secure VPNs 27:55

1 Windows Remote Desktop Protocol: Remote to Rogue 34:27

1 Cybersecurity Conversations with the C-Suite and Board 36:14




1 The Art of Remediation in Incident Response 40:59

1 How to Run an Effective Tabletop Exercise 29:14

1 Using LLMs to Analyze Windows Binaries 36:40

1 How Threat Actors Bypass Multi-Factor Authentication 27:20

1 TAG's Work Tracking Commercial Surveillance Vendors 23:58

1 What Iranian Threat Actors Have Been Up To This Year 36:13

1 Mandiant's Approach to Securely Using AI Solutions 32:00

1 Lessons Learned from Responding to Cloud Compromises 30:16


1 Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances 27:47

1 M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher 25:53

1 Assessing the State of Multifaceted Extortion Operations 40:54

1 Hunting for "Living off the Land" Activity 42:32

1 Director of NSA's Cybersecurity Collaboration Center on Trends in 2024 25:48


1 Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO 44:27

1 Is The CTI Lifecycle Due For An Update? 28:08

1 Threat Trends: Hacktivists' Continued Use of DDoS 44:50

1 Threat Trends: Tales from the 2023 Trenches 37:47

1 Threat Trends: DHS Secretary Alejandro Mayorkas in Conversation with Kevin Mandia 20:44

1 Threat Trends: Addressing Risk in the Cloud with Wiz 37:05

1 Threat Trends: Unraveling WyrmSpy and DragonEgg Mobile Malware with Lookout 32:42

1 Threat Trends: The Implications of the MOVEit Compromise 27:51

1 Threat Trends: A Requirements-Driven Approach to Cyber Threat Intelligence 27:39

1 Frontline Stories: Crisis Communications During a Breach 31:26

1 Threat Trends: UNC961 and How Managed Defense Approaches Threat Hunting 30:20

1 Frontline Stories: The Executive's Role in Cybersecurity 33:17

1 Threat Trends: Bonus Episode - How Will AI Impact Threat Intelligence? 9:22


1 Frontline Stories: Exposure Management Beyond Vulnerabilities 25:48

1 Threat Trends: How APT43 Targets Security Policy Experts Focused on North Korea 39:17

1 Threat Trends: A Retrospective on Zero-Days in 2022 with Project Zero and Mandiant 48:46

1 Threat Trends: Head of TAG on Commercial Spyware, Cyber Activity in Eastern Europe and More 25:19

1 Frontline Stories: A CISO's Perspective on Managing a Breach 32:41

1 Threat Trends: An Episode (Mostly) About Non-Ransomware Cyber Crime 48:26


1 Skills Gap: Addressing the Cyber Mobilization Crisis 23:35

1 Frontline Stories: Get the Facts on Fraud 23:43

1 Threat Trends: A Year in Review with Sandra Joyce 30:48

1 Frontline Stories: A Conversation on Third-Party Risk Management 24:10

1 Skills Gap: Transitioning from Military Service to a Role in Cyber 27:11

1 Threat Trends: Reflections on Russian Cyber Threat Activity During the War in Ukraine 43:54

1 Frontline Stories: Cyber Insurance to Make Companies Safer 30:09

1 Threat Trends: Tracking DPRK Use of Cryptocurrencies 36:58


1 Threat Trends: Inside Google Cloud's Threat Horizons Report 31:34


1 Threat Trends: The Threat Landscape in APJ 22:01

1 Frontline Stories: The Evolution of the CISO 32:02

1 Threat Trends: Metador, Mercenaries, and LABScon with SentinelOne 40:48

1 Threat Trends: The Security Landscape Facing Manufacturing 37:35

1 Skills Gap: Expanding Diversity in Cyber Security 37:40

1 Threat Trends: APT42 - Crooked Charms, Cons, and Compromises 50:58

1 Frontline Stories: Discussing the Impact of CISA KEV with Nucleus Security 27:39

1 Skills Gap: Building a Successful Security Operations Team 17:19

1 Threat Trends: Building Cyber Resiliency Within Financial Services with FS-ISAC 36:39

1 Frontline Stories: Shields Up, Mandiant 36:18

1 Threat Trends: Securing the Vote in 2022 36:06

1 Skills Gap: Looking Beyond the Unicorn Candidate 28:13

1 Threat Trends: How Adversaries Are Leveraging AI in Cyber Operations 32:28

1 Bonus: Securing OT/ICS Systems with Nozomi Networks 24:21

1 Threat Trends: An Interview with the Danish Tech Ambassador 38:27


1 Threat Trends: Tracking Threat Actor Usage of Cryptocurrencies with Chainalysis 43:11

1 Frontline Stories: Introducing Mandiant Digital Risk Protection 34:12

1 Threat Trends: After the Headlines - Practical Experience of Rebuilding Trust After a Breach 28:13


1 Threat Trends: Information Operations Surrounding the Russian Invasion of Ukraine 45:04

1 Threat Trends: UNC3524 - Eye Spy on Your Email 32:58

1 Threat Trends: Breaking Down the 2022 M-Trends Report 42:02

1 Threat Trends: The Evolving Threat Landscape in Europe 36:16

1 Welcome to the Defender's Advantage Podcast 1:11

1 Left on Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity 33:25


1 The Role of Contractors in Cyber Operations 59:45



1 Leveraging Military Experience in an InfoSec Career 33:26

1 Analyzing Vulnerability and Exploitation Activity in 2021 49:29
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.