Adversary Universe Podcast

When the Adversary Shows Up in Person


Listen Later

Physical security and IT security have gone hand in hand for a long time. While cybersecurity teams are rightfully focused on protecting their virtual environments, they should also have an eye on whether an adversary is walking through the front door.

 

“Anytime there’s a physical boundary, an adversary is going to look to cross over that — whether it be in person or using some technology to get over that boundary,” Adam says in this episode on physical security threats. 

 

Not too long ago, it was common for someone to walk into a business, slide behind the counter, and insert a USB device into a point-of-sale system to deploy malware or remote access tools. Now, this type of activity is less common, but it still occurs; China-nexus threat actor MUSTANG PANDA, for example, is dropping USB sticks to gain access to targets across the Asia Pacific region.

 

This conversation is full of twists, turns, and interesting stories. Tune in to hear about adversaries physically breaking into target organizations, Adam’s adventures in pen testing, the physical security implications for internet of things (IoT) and operational technology (OT) environments, and what organizations should know about protecting their physical environments. 

...more
View all episodesView all episodes
Download on the App Store

Adversary Universe PodcastBy CrowdStrike

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

75 ratings


More shows like Adversary Universe Podcast

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,986 Listeners

Risky Business by Patrick Gray

Risky Business

364 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

639 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

369 Listeners

Hacked by Hacked

Hacked

180 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,012 Listeners

Click Here by Recorded Future News

Click Here

407 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,962 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

174 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

190 Listeners

Hacking Humans by N2K Networks

Hacking Humans

316 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

77 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

128 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

43 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

169 Listeners