Adam Meyers

Adam Meyers has authored numerous papers for peer-reviewed industry venues and has received awards for his dedication to the information security industry. As Vice President of Intelligence for Crowdstrike, Meyers oversees all of CrowdStrike’s intelligence gathering and cyber-adversarial monitoring activities. Previously, Meyers was the Director of Cyber Security Intelligence with the National Products and Offerings Division of SRA International where he provided technical expertise at the tactical level and strategic guidance on overall security program objectives.

Articles from Adam

Software Supply Chain Attacks On The Rise, Undermining Customer Trust

Software Supply Chain Attacks on the Rise, Undermining Customer Trust

On June 27, 2017, a destructive payload dubbed “NotPetya” by researchers, was deployed covertly using a legitimate software package employed…

Danger Close: Fancy Bear Tracking Of Ukrainian Field Artillery Units

Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units

Update - As of March 2017, the estimated losses of D-30 howitzer platform have been amended. According to an update…

‘Tis The Season For Account Thievin’

‘Tis the Season for Account Thievin’

Brooklyn born Willie Sutton made a career in crime; robbing banks and jewelry stores often in disguise earning him the…

CrowdStrike’s New Methodology For Tracking ECrime

CrowdStrike’s New Methodology for Tracking eCrime

At our inception, CrowdStrike coined the phrase, “You don’t have a malware problem, you have an adversary problem.” Behind every…

Cyber Skirmish: Russia V. Turkey

Cyber Skirmish: Russia v. Turkey

On the morning of 24 November 2015 an F-16 operated by the Turkish Air Force dropped into position behind a…

CrowdStrike’s 2015 Global Threat Report: Intelligence For The Business

CrowdStrike’s 2015 Global Threat Report: Intelligence for the Business

Over the past several years an increasing number of organizations have turned to threat intelligence to counter the aggressions of…

2015 CrowdStrike Global Threat Report Preview

2015 CrowdStrike Global Threat Report Preview

With every year that passes, the stakes for connecting a business to the Internet dramatically increase. In 2013, the use…

3 Tips For Operationalizing Cyber Intelligence

3 Tips for Operationalizing Cyber Intelligence

In 2014 it became abundantly clear that threat intelligence provides a decisive advantage in protecting your enterprise. Using threat intelligence,…

Operational Threat Intelligence With Maltego Transform Hub

Operational threat intelligence with Maltego Transform Hub

“I’m drowning in data, but starving for information.” Ever feel that way? Recently, I heard a CISO use this as…

Adversaries Set Their Sights On Oil And Gas Sector

Adversaries Set Their Sights on Oil and Gas Sector

With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those…

 

Stop Breaches with CrowdStrike Falcon request a live demo