The Defender's Advantage Podcast

Detajet e Kanalit

The Defender's Advantage Podcast

The Defender's Advantage Podcast

Krijuesi: Mandiant

Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into...

EN-US United States Teknologjia

Episode të Fundit

173 episode
How vSphere Became a Target for Adversaries

How vSphere Became a Target for Adversaries

Stuart Carrera (Senior Consultant, Mandiant Consulting) joins host Luke McNamara to discuss how threat actors are increasingly targeting the VMware vS...

2025-09-15 09:00:00 2341
AI Tools and Sentiment Within the Underground Cyber Crime Community

AI Tools and Sentiment Within the Underground Cyber Crime Community

Michelle Cantos (Senior Analyst, Google Threat Intelligence Group) joins host Luke McNamara to discuss some of the recent trends in underground market...

2025-08-18 09:00:00 1544
Protecting the Core: Securing Protection Relays in Modern Substations

Protecting the Core: Securing Protection Relays in Modern Substations

Host Luke McNamara is joined by members of Mandiant Consulting's Operational Technology team (Chris Sistrunk, Seemant Bisht, and Anthony Candarini) to...

2025-07-28 07:00:00 2585
The Rise of ClickFix

The Rise of ClickFix

Dima Lenz (Security Engineer, Google Threat Intelligence Group) joins host Luke McNamara to discuss how threat actors have been using ClickFix to soci...

2025-07-15 12:00:00 1413
Vishing in the Wild

Vishing in the Wild

Nick Guttilla and Emily Astranova, from Mandiant Consulting's Offensive Security team, join host Luke McNamara for an episode on voice-based phishing,...

2025-06-04 07:00:00 2268
Responding to a DPRK ITW Incident

Responding to a DPRK ITW Incident

JP Glab (Mandiant Consulting) joins host Luke to discuss responding to activity from North Korean IT workers. He walks through what initially triggere...

2025-05-19 05:00:00 995
UNC5221 and The Targeting of Ivanti Connect Secure VPNs

UNC5221 and The Targeting of Ivanti Connect Secure VPNs

Matt Lin (Senior Incident Response Consultant, Mandiant) and Daniel Spicer (Chief Security Officer, Ivanti) dive into the research and response of UNC...

2025-05-05 13:00:00 1675
Windows Remote Desktop Protocol: Remote to Rogue

Windows Remote Desktop Protocol: Remote to Rogue

Host Luke McNamara is joined by GTIG Senior Security Researcher Rohit Nambiar to discuss Rohit's recent blog on some interesting usage of RDP by UNC58...

2025-04-14 14:00:00 2067
Cybersecurity Conversations with the C-Suite and Board

Cybersecurity Conversations with the C-Suite and Board

Imran Ahmad (Senior Partner, Canadian Head of Technology and Canadian Co-Head of Cybersecurity and Data Privacy at Norton Rose Fulbright) joins host L...

2025-03-10 08:00:00 2174
What to Watch For in 2025

What to Watch For in 2025

Kelli Vanderlee, Kate Morgan, and Jamie Collier join host Luke McNamara to discuss trends that are top of mind for them in tracking emergent threats t...

2025-02-28 08:00:00 2671
Signals of Trouble

Signals of Trouble

Dan Black (Principal Analyst, Google Threat Intelligence Group) joins host Luke McNamara to discuss the research into Russia-aligned threat actors see...

2025-02-19 05:00:00 1563
Agentic AI in Cybersecurity

Agentic AI in Cybersecurity

Steph Hay (Senior Director for Gemini Product and UX, Google Cloud Security) joins host Luke McNamara to discuss agentic AI and its implications for s...

2025-02-05 13:00:00 1600
The Art of Remediation in Incident Response

The Art of Remediation in Incident Response

Jibran Ilyas (Consulting Leader, Mandiant Consulting) joins host Luke McNamara to discuss remediation as part of incident response. Jibran covers vari...

2024-12-02 11:00:00 2459
How to Run an Effective Tabletop Exercise

How to Run an Effective Tabletop Exercise

Mandiant Senior Consultant Alishia Hui joins host Luke McNamara to discuss all things tabletop exercise related. Alishia walks through the elements of...

2024-10-18 05:00:00 1754
Using LLMs to Analyze Windows Binaries

Using LLMs to Analyze Windows Binaries

Vicente Diaz, Threat Intelligence Strategist at VirusTotal, joins host Luke McNamara to discuss his research into using LLMs to analyze malware. Vicen...

2024-10-04 03:00:00 2200
How Threat Actors Bypass Multi-Factor Authentication

How Threat Actors Bypass Multi-Factor Authentication

Josh Fleischer, Principal Security Analyst with Mandiant's Managed Defense organization sits down with host Luke McNamara to discuss trends in MFA byp...

2024-09-26 06:00:00 1640
TAG's Work Tracking Commercial Surveillance Vendors

TAG's Work Tracking Commercial Surveillance Vendors

Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial s...

2024-09-04 11:00:00 1438
What Iranian Threat Actors Have Been Up To This Year

What Iranian Threat Actors Have Been Up To This Year

Mandiant APT Researcher Ofir Rozmann joins host Luke McNamara to discuss some notable Iranian cyber espionage actors and what they have been up to in...

2024-07-25 04:00:00 2173
Mandiant's Approach to Securely Using AI Solutions

Mandiant's Approach to Securely Using AI Solutions

Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for sec...

2024-06-27 11:00:00 1920
Lessons Learned from Responding to Cloud Compromises

Lessons Learned from Responding to Cloud Compromises

Mandiant consultants Will Silverstone (Senior Consultant) and Omar ElAhdan (Principal Consultant) discuss their research into cloud compromise trends...

2024-06-03 11:00:00 1816
The ORB Networks

The ORB Networks

Michael Raggi (Principal Analyst, Mandiant Intelligence) joins host Luke McNamara to discuss Mandiant's research into China-nexus threat actors using...

2024-05-22 06:00:00 1794
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances

Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances

Mandiant Principal Analysts John Wolfram and Tyler McLellan join host Luke McNamara to discuss their research in the "Cutting Edge" blog series, a ser...

2024-05-16 05:00:00 1667
M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher

M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher

Jurgen Kutscher, Mandiant Vice President for Consulting, joins host Luke McNamara to discuss the findings of the M-Trends 2024 report.  Jurgen shares...

2024-04-29 10:00:00 1553
Assessing the State of Multifaceted Extortion Operations

Assessing the State of Multifaceted Extortion Operations

Kimberly Goody, Head of Mandiant's Cyber Crime Analysis team and Jeremy Kennelly, Lead Analyst of the same team join host Luke McNamara to breakdown t...

2024-04-11 03:00:00 2454
Hunting for "Living off the Land" Activity

Hunting for "Living off the Land" Activity

Host Luke McNamara is joined by Mandiant consultants Shanmukhanand Naikwade and Dan Nutting to discuss hunting for threat actors utilizing "living off...

2024-03-29 05:00:00 2552
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024

Director of NSA's Cybersecurity Collaboration Center on Trends in 2024

Morgan Adamski, Director of the NSA's Cybersecurity Collaboration Center (CCC) joins host Luke McNamara to discuss the threat posed by Volt Typhoon an...

2024-03-14 10:00:00 1548
The North Korean IT Workers

The North Korean IT Workers

Principal Analyst Michael Barnhart joins host Luke McNamara to discuss Mandiant's research into the threat posed by the Democratic People's Republic o...

2024-02-21 13:00:00 2080
Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO

Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO

Taylor Lehmann (Director, Google Cloud Office of the CISO) and Bill Reid (Security Architect, Google Cloud Office of the CISO) join host Luke McNamara...

2024-02-07 13:00:00 2667
Is The CTI Lifecycle Due For An Update?

Is The CTI Lifecycle Due For An Update?

Mandiant Intelligence Advisor Renze Jongman joins host Luke McNamara to discuss his  blog on the CTI Process Hyperloop and applying threat intelligenc...

2024-01-25 05:00:00 1688
Threat Trends: Hacktivists' Continued Use of DDoS

Threat Trends: Hacktivists' Continued Use of DDoS

For our first episode of 2024, host Luke McNamara is joined by Mandiant Senior Technical Director Jose Nazario and Principal Analysts Alden Wahlstrom...

2024-01-10 10:00:00 2690
Threat Trends: Tales from the 2023 Trenches

Threat Trends: Tales from the 2023 Trenches

Doug Bienstock and Josh Madelay, Regional Leads for Mandiant Consulting, join host Luke McNamara to walk through some of the trends they have witnesse...

2023-12-12 11:00:00 2267
Threat Trends: DHS Secretary Alejandro Mayorkas in Conversation with Kevin Mandia

Threat Trends: DHS Secretary Alejandro Mayorkas in Conversation with Kevin Mandia

Host Luke McNamara is joined for this special episode highlighting October as Cybersecurity Awareness Month by Kevin Mandia and DHS Secretary Alejandr...

2023-10-25 11:00:00 1244
Threat Trends: Addressing Risk in the Cloud with Wiz

Threat Trends: Addressing Risk in the Cloud with Wiz

Host Luke McNamara is joined by Amitai Cohen, Attack Vector Intel Lead at Wiz to discuss trends in cloud security, managing risk, and more. 

2023-10-19 01:00:00 2225
Threat Trends: Unraveling WyrmSpy and DragonEgg Mobile Malware with Lookout

Threat Trends: Unraveling WyrmSpy and DragonEgg Mobile Malware with Lookout

Host Luke McNamara is joined by Kristina Balaam, Staff Threat Researcher at Lookout, to discuss her work attributing two new mobile malware families t...

2023-09-20 02:00:00 1962
Threat Trends: The Implications of the MOVEit Compromise

Threat Trends: The Implications of the MOVEit Compromise

Charles Carmakal, CTO for Mandiant Consulting, joins host Luke McNamara to discuss the long tail impact of FIN11's compromise of the MOVEit file trans...

2023-07-20 04:00:00 1671
Threat Trends: A Requirements-Driven Approach to Cyber Threat Intelligence

Threat Trends: A Requirements-Driven Approach to Cyber Threat Intelligence

Dr. Jamie Collier (Senior Threat Intelligence Advisor, Mandiant) joins host Luke McNamara to discuss the recent white paper from Mandiant about develo...

2023-06-16 04:00:00 1659
Frontline Stories: Crisis Communications During a Breach

Frontline Stories: Crisis Communications During a Breach

Dan Wire from Mandiant joins host Kerry Matre to discuss the ins and outs of crisis communications during a breach as well as what you can do to prepa...

2023-06-06 05:00:00 1886
Threat Trends: UNC961 and How Managed Defense Approaches Threat Hunting

Threat Trends: UNC961 and How Managed Defense Approaches Threat Hunting

Ryan Tomcik, Dan Fenwick, and Tim Martin join host Luke McNamara to discuss how Managed Defense conducts proactive hunting, illustrated by several UNC...

2023-05-26 04:00:00 1820
Frontline Stories: The Executive's Role in Cybersecurity

Frontline Stories: The Executive's Role in Cybersecurity

What role do executives and the board play in cybersecurity and breach management. Hear from Jesse Jordan and Howard Israel of Mandiant discuss their...

2023-05-17 11:00:00 1997
Threat Trends: Bonus Episode - How Will AI Impact Threat Intelligence?

Threat Trends: Bonus Episode - How Will AI Impact Threat Intelligence?

The endless battle of threat actors versus cybersecurity professionals may come down to who deploys AI better.  In this interview from RSA, John Hultq...

2023-05-09 11:00:00 562
0:00
0:00
Episode
home.no_title_available
home.no_channel_info