PODCAST · technology

Breach, Please!

Welcome to Breach, Please!—your essential podcast for everything cyber threat intelligence, threat research, malware analysis, reverse engineering, threat hunting, and detection development. This podcast is brought to you by the Cyber Threat Intelligence (CTI) team at Critical Start, where our team is dedicated to peeling back the layers of modern cyber threats and exploring the innovative strategies used to keep networks secure and one step ahead of attackers.In each episode, we’ll take you behind the scenes of the latest cyber threat landscape, sharing exclusive insights into how our team approaches complex security challenges. Expect discussions on breaking down advanced threat behaviors, dissecting the tactics used in recent high-profile breaches, and insights into our own research processes. We’ll be covering everything from intelligence collection and threat attribution to deep dives into the tools and methodologies that empower effective detection and response.<

No episodes available yet.

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

Welcome to Breach, Please!—your essential podcast for everything cyber threat intelligence, threat research, malware analysis, reverse engineering, threat hunting, and detection development. This podcast is brought to you by the Cyber Threat Intelligence (CTI) team at Critical Start, where our team is dedicated to peeling back the layers of modern cyber threats and exploring the innovative strategies used to keep networks secure and one step ahead of attackers.In each episode, we’ll take you behind the scenes of the latest cyber threat landscape, sharing exclusive insights into how our team approaches complex security challenges. Expect discussions on breaking down advanced threat behaviors, dissecting the tactics used in recent high-profile breaches, and insights into our own research processes. We’ll be covering everything from intelligence collection and threat attribution to deep dives into the tools and methodologies that empower effective detection and response.<

HOSTED BY

Callie Guenther, Senior Manager - Cyber Threat Research at Critical Start

URL copied to clipboard!