
Sign up to save your podcasts
Or


Description: A deep dive into adversary collection tactics within enterprise networks. Through expert analysis and real case studies, we explore how attackers systematically gather sensitive data using both sophisticated and everyday tools. From keylogging to screen capture, understand the methods that make data theft possible and the critical defenses that stop it. Based on MITRE ATT&CK® research, this series delivers actionable insights for security professionals and IT administrators.
By Future Center Ventures, Mark M. Whelan5
22 ratings
Description: A deep dive into adversary collection tactics within enterprise networks. Through expert analysis and real case studies, we explore how attackers systematically gather sensitive data using both sophisticated and everyday tools. From keylogging to screen capture, understand the methods that make data theft possible and the critical defenses that stop it. Based on MITRE ATT&CK® research, this series delivers actionable insights for security professionals and IT administrators.

229,013 Listeners

1,021 Listeners

3,860 Listeners

16,097 Listeners

74 Listeners

3 Listeners