DiscoverThreat Talks - Your Gateway to Cybersecurity InsightsBreaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast
Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast

Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast

Update: 2025-02-11
Share

Description

๐Ÿ”’ Are endpoint protection solutions enough to safeguard your organization?

In this episode of Threat Talks โ€“ The Deep Dive, Rob Maas hosts Luca Cipriano, ON2ITโ€™s Cyber Threat Specialist, to uncover the truth.


Learnโœ… The differences between AVs, EDRs, and XDRs

โœ… Common bypass techniques used by attackers

โœ… Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy


๐Ÿ’ก Key Insights

  • EDRs are essential but not invincible
  • Combining smart tools with robust security practices is the winning strategy


๐Ÿ“ฉ Have questions or thoughts?

Reach out at team@threat-talks.com!

๐ŸŽ™๏ธ Follow Threat Talks for weekly cybersecurity insights.=== โ–บ YOUTUBE: https://youtube.com/@ThreatTalksโ–บ SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7Eโ–บ APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520๐Ÿ‘• Receive your Threat Talks T-shirthttps://threat-talks.com/breaking-the-defenses-edr-bypass/๐Ÿ—บ๏ธ Explore the Hack's Route in Detail ๐Ÿ—บ๏ธhttps://threat-talks.com/downloads/๐Ÿ•ต๏ธ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Commentsย 
loading
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast

Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast

Threat Talks