Adam Meyers

Adam Meyers has authored numerous papers for peer-reviewed industry venues and has received awards for his dedication to the information security industry. As Vice President of Intelligence for Crowdstrike, Meyers oversees all of CrowdStrike’s intelligence gathering and cyber-adversarial monitoring activities. Previously, Meyers was the Director of Cyber Security Intelligence with the National Products and Offerings Division of SRA International where he provided technical expertise at the tactical level and strategic guidance on overall security program objectives.

Articles from Adam

2015 CrowdStrike Global Threat Report Preview

2015 CrowdStrike Global Threat Report Preview

With every year that passes, the stakes for connecting a business to the Internet dramatically increase. In 2013, the use…

3 Tips For Operationalizing Cyber Intelligence

3 Tips for Operationalizing Cyber Intelligence

In 2014 it became abundantly clear that threat intelligence provides a decisive advantage in protecting your enterprise. Using threat intelligence,…

Operational Threat Intelligence With Maltego Transform Hub

Operational threat intelligence with Maltego Transform Hub

“I’m drowning in data, but starving for information.” Ever feel that way? Recently, I heard a CISO use this as…

Adversaries Set Their Sights On Oil And Gas Sector

Adversaries Set Their Sights on Oil and Gas Sector

With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those…

Peering Around The Corner

Peering Around the Corner

After the better part of a decade chasing adversaries around the Internet, there are a few things I know to…

Meet The Adversaries

Meet the Adversaries

Forewarned is forearmed, and nowhere is this sentiment more true than in the field of cybersecurity.  When George Kurtz and…

Gameover

Gameover

On Friday May 30, 2014, an unprecedented botnet disruption was initiated by the United States Department of Justice (DOJ) in…

VICEROY TIGER Delivers New Zero-Day Exploit

VICEROY TIGER Delivers New Zero-Day Exploit

On November 5, 2013, Microsoft announced that a vulnerability in the Microsoft Graphics Component could allow Remote Code Execution (RCE). This announcement…

DNS – The Lifeblood Of Your Domain

DNS – The Lifeblood of your Domain

As the situation on the ground in Syria continues to deteriorate, the Syrian Electronic Army (SEA) has made quite a…

Cyber Intelligence Class At BlackHat USA

Cyber Intelligence Class at BlackHat USA

This year at Black Hat, I’ll be teaching a new class as a follow-on to my popular Cyber Defense Bootcamp…

 

Stop Breaches with CrowdStrike Falcon Request A Demo