Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/97/f5/a6/97f5a6d4-8766-6385-0693-c6b2a14d1f07/mza_3168027762309406548.jpg/600x600bb.jpg
Hacker Valley Red
Hacker Valley Media
27 episodes
9 months ago
Exploring the offensive side of cybersecurity through eyes of the experts that build it. Looking at red teaming, bug bounty, pentesting and more.
Show more...
Technology
RSS
All content for Hacker Valley Red is the property of Hacker Valley Media and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exploring the offensive side of cybersecurity through eyes of the experts that build it. Looking at red teaming, bug bounty, pentesting and more.
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/97/f5/a6/97f5a6d4-8766-6385-0693-c6b2a14d1f07/mza_3168027762309406548.jpg/600x600bb.jpg
CrowdStrike 2022 Global Threat Report: Cloud Security
Hacker Valley Red
29 minutes 8 seconds
3 years ago
CrowdStrike 2022 Global Threat Report: Cloud Security
In this special mini series of Hacker Valley Red, hosts Ron and Chris are joined by the Senior Vice President of Intelligence at CrowdStrike, Adam Meyers, to review and highlight elements shared in CrowdStrike’s 2022 Global Threat Report.  In the final episode of this series Ron, Chris and Adam discuss threats to cloud infrastructure and how to better secure the gaps. Adam explores how the adoption of cloud technology has expanded our attack surface, how the digital transformation has placed significant strain on asset management and observability, and why identity protection and zero trust protocols might be your biggest defense against data breaches. He takes a deep dive into the Log4J vulnerability and its massive impact on cybersecurity teams all over the world. Finally, the trio examine the intersection of cloud and supply chain security and its implications on security operations.   Guest Bio: Adam Meyers is a recognized expert in the security and intelligence communities. With more than 15 years of experience in the security space, Adam has extensive experience building and leading intelligence practices in both the public and private sector. Adam is a founding employee and SVP on the executive team at CrowdStrike Inc., a global provider of security technology and services focused on identifying advanced threats and targeted attacks. A sought-after thought-leader, Adam conducts speaking engagements and training classes around the world on the topics of threat intelligence, reverse engineering, and data breach investigations.   Links: Stay in touch with Adam Meyers on LinkedIn and TwitterFollow CrowdStrike on LinkedIn and  Twitter and learn more about what CrowdStrike has to offer on their websiteHacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | WebsiteSupport Hacker Valley Studio on PatreonContinue the conversation on our DiscordThanks to our friends at CrowdStrike for sponsoring this episode!  
Hacker Valley Red
Exploring the offensive side of cybersecurity through eyes of the experts that build it. Looking at red teaming, bug bounty, pentesting and more.