Best Podcast Episodes About CrowdStrike

Best Podcast Episodes About CrowdStrike

Everything podcasters are saying about CrowdStrike — curated from top podcasts

Updated: Apr 09, 2026 – 13 episodes
Listen to the Playlist

Ridealong has curated the best and most interesting podcasts and clips about CrowdStrike.

Top Podcast Clips About CrowdStrike

TBPN
“… kind of the debate that's been raging internally about some of his recent decision-making. Okay, before we do this, I'm going to tell you about CrowdStrike. Your business is AI.” “… the Casey Neistat style on the Ray-Bans, you know what he does, where he spray paints them white and then like scratches off the whites. Oh, it's a really, really cool design. He's very popular for this. All right, let's maybe skip forward and talk about kind of the debate that's been raging internally about some of his recent decision-making. Okay, before we do this, I'm going to tell you about CrowdStrike. Your business is AI.” View more
Ridealong summary
John Ternus, Apple's potential next CEO, is a car racing and cycling enthusiast, but he's also known for being risk-averse, much like Tim Cook. His cautious approach has some executives questioning whether he can innovate or if he will maintain the status quo at Apple. As the debate heats up, Ternus's leadership style could define the future of the tech giant.
TBPN · Hill & Valley Gigastream, Apple's Next CEO, OpenAI's Non-Profit | Scott Nolan, Sarah Guo, Casey Handmer, Shaun Maguire, Delian Asparouhov, Zach Dell, Ryan Petersen, and Chase Lochmiller · Mar 24, 2026
CISO Series Podcast
“… And when I had to be NIST compliant at a previous company, I actually had to take my security profile backwards because I couldn't use things like CrowdStrike because the regulations prevented me from using things in the cloud where other people had access to. And so you really need to look at what's best for the business and how to enable your business to do what it needs to do. Have you ever seen somebody with an RF gun trying to type in a 20-character password, and it's just not practical, right? So looking at the controls that you have in place and the risk associated with them, so let's reduce …” “… this is the day we need to stop. So like, how do you figure this out, Julie? Yeah, it's not an easy one. And I can give you a prime example. I've always said compliance is not security, right? That's a theme that we've had many times too. Yes. Yeah. And when I had to be NIST compliant at a previous company, I actually had to take my security profile backwards because I couldn't use things like CrowdStrike because the regulations prevented me from using things in the cloud where other people had access to. And so you really need to look at what's best for the business and how to enable your business to do what it needs to do. Have you ever seen somebody with an RF gun trying to type in a 20-character password, and it's just not practical, right? So looking at the controls that you have in place and the risk associated with them, so let's reduce the length of the password for those individuals to make it easier for them. But the domain admins, maybe we do keep it more complex or better protected. So it's really taking a step back and looking at what are we trying to do here? How do we enable the business to do what they need to do at the same time of reducing risk around the highest risk …” View more
Ridealong summary
Compliance can hinder security measures, as seen when regulations forced a company to revert to less effective security protocols. This highlights the need for businesses to reassess their security controls regularly and ensure they align with actual risk management rather than outdated compliance requirements. The conversation emphasizes the importance of adapting security practices to the evolving needs of the business.
CISO Series Podcast · Why Highlight Diversity When We Can Just Hope You Don't Notice? · Mar 24, 2026
TBPN
“You would see the traditional cybersecurity platforms, you know, the Palo Alto, the WEEZ, the CrowdStrike of the world. You'd see the cloud providers, you know, Google, Amazon, Microsoft. And there'll be a third group, which is the AI platforms. And, you know, we shall see who would hold keys for cybersecurity. And you know that you know if you ask me the same question 12 months ago I would not even mention the third group So it really hard when technology moves at deep space It really hard to make predictions And I'm not afraid of making a fool of …” “You would see the traditional cybersecurity platforms, you know, the Palo Alto, the WEEZ, the CrowdStrike of the world. You'd see the cloud providers, you know, Google, Amazon, Microsoft. And there'll be a third group, which is the AI platforms. And, you know, we shall see who would hold keys for cybersecurity. And you know that you know if you ask me the same question 12 months ago I would not even mention the third group So it really hard when technology moves at deep space It really hard to make predictions And I'm not afraid of making a fool of myself. I do that almost every day. But making predictions right now is guaranteed to make fool of yourself. I was just going to ask you for another prediction, but I guess I'll table it for next time. Thank you so much for taking this. I can share with you the predictions I made today in a closed room. Please. But, you know, maybe I'll start with …” View more
Ridealong summary
In less than a year, AI has transformed predictions about cybersecurity, leading to companies achieving remarkable revenues with minimal staff. For instance, a single-founder company reached $3.5 million in annual revenue, while another hit $100 million with only 20 employees. This trend suggests that we might soon see Fortune 100 companies operating cybersecurity teams with fewer than 10 employees, shifting the profession towards a function driven by AI.
TBPN · AI Side Quests, Zaslav's Payday, SF Housing Market is Back | Shyam Sankar, Gili Raanan, Anna Patterson, Jake Loosararian, carried_no_interest · Mar 17, 2026
The AI Daily Brief: Artificial Intelligence News and Analysis
“… AWS CISO Amy Herzog saying that her team has been using the model to test critical code bases, saying it is already helping us strengthen our code. CrowdStrike CTO Elia Zatsev commented on the urgency, stating, the window between a vulnerability being discovered and being exploited by an adversary has collapsed. What once took months now happens in minutes with AI. And frankly, the tone from Anthropic is not particularly optimistic. In their blog post announcing the plan, Anthropic wrote, Project Glasswing is a starting point. No one organization can solve these cybersecurity problems alone. Frontier …” “… on this, this is not just a model being previewed for cybersecurity research purposes, but more like an all-out mobilization of global cybersecurity experts to fix the world's software as quickly as possible. Work on this has already begun, with AWS CISO Amy Herzog saying that her team has been using the model to test critical code bases, saying it is already helping us strengthen our code. CrowdStrike CTO Elia Zatsev commented on the urgency, stating, the window between a vulnerability being discovered and being exploited by an adversary has collapsed. What once took months now happens in minutes with AI. And frankly, the tone from Anthropic is not particularly optimistic. In their blog post announcing the plan, Anthropic wrote, Project Glasswing is a starting point. No one organization can solve these cybersecurity problems alone. Frontier AI developers, other software companies, security researchers, open source maintainers, and governments across the world all have essential roles to play. The work of defending the world's cyber infrastructure might take years, but frontier AI capabilities are likely to advance substantially over just the next few months. For cyber defenders to …” View more
Ridealong summary
Anthropic's decision to pause Mythos AI and launch Glasswing reflects a necessary industry-wide mobilization to address urgent cybersecurity threats, despite the terrifying potential of AI as a cyberweapon.
The Mythos AI model is a powerful tool that could revolutionize cybersecurity but also poses significant risks if misused, likened to a cyberweapon capable of mass destruction.
AI's dual role in cybersecurity is both a powerful defense tool and a potential cyberweapon, creating a race against time to manage its implications.
The AI Daily Brief: Artificial Intelligence News and Analysis · Should We Be Scared of Anthropic's Mythos? · Apr 08, 2026
TBPN
“… for cybersecurity. And so key partners include Apple, Google, Microsoft, Amazon, NVIDIA, JPMorgan Chase, Broadcom, the Linux Foundation, Cisco, CrowdStrike, and Palo Alto Networks. They're all listed on the cybersecurity focus page for Project Glasswing. Chris Backey was having a little bit of fun because he noticed Anthropic put their own logo on the partner page, which is a little bit funny. But at the same time, it's kind of smart because a lot of people are just going to see the image quickly. And it's good to position yourself with the other companies. So, yeah, it is interesting. I mean, …” “… critical infrastructure because the model is particularly good at finding zero days, bugs, and exploits in technical systems. And if they leak that out before big companies have time to go and address all the bugs, there could be serious ramifications for cybersecurity. And so key partners include Apple, Google, Microsoft, Amazon, NVIDIA, JPMorgan Chase, Broadcom, the Linux Foundation, Cisco, CrowdStrike, and Palo Alto Networks. They're all listed on the cybersecurity focus page for Project Glasswing. Chris Backey was having a little bit of fun because he noticed Anthropic put their own logo on the partner page, which is a little bit funny. But at the same time, it's kind of smart because a lot of people are just going to see the image quickly. And it's good to position yourself with the other companies. So, yeah, it is interesting. I mean, people have predicted that AI models would be particularly good at cyber attacks. And this was one of the main sort of vectors of AI fears. it feels like this is what maybe what Dario was referring to when he was talking about the end of the exponential finding and exploiting software bugs is it's sort of perfectly in the sweet spot for coding agents …” View more
Ridealong summary
Anthropic's cautious release of Mythos AI highlights the dual potential of AI for cybersecurity and cyber threats, emphasizing the need for controlled deployment.
TBPN · Meta’s AI Comeback Moment, Claude Mythos | Diet TBPN · Apr 09, 2026
TBPN
“… but first i'll tell everyone a very important message from crowd strike which is super relevant today your business their business is securing it. CrowdStrike secures AI and stops breaches. And I'll also tell everyone about Cisco. Critical infrastructure for the AI era. Unlock seamless real-time experiences and new value with Cisco. So Andre Karpathy said, new supply chain attack, this time for NPM Axios. The most popular HTTP client library with 300 million weekly downloads. That's a lot. Scanning my system, Andre Karpathy says he found a use imported from Google Workspace slash CLI from a few days …” “… every password API key and access token on any machine that installed the compromised update and check your network logs for connections to sfrclak or the ip address 142 11 206 73 carpathy had some context if you want to go through this john i will but first i'll tell everyone a very important message from crowd strike which is super relevant today your business their business is securing it. CrowdStrike secures AI and stops breaches. And I'll also tell everyone about Cisco. Critical infrastructure for the AI era. Unlock seamless real-time experiences and new value with Cisco. So Andre Karpathy said, new supply chain attack, this time for NPM Axios. The most popular HTTP client library with 300 million weekly downloads. That's a lot. Scanning my system, Andre Karpathy says he found a use imported from Google Workspace slash CLI from a few days ago when I was experimenting with Gmail Gcal CLI. The installed version luckily resolved to the previous version, the unaffected 1.13.5, but the project dependency is not pinned, meaning that if he did this earlier today, the code would have resolved, everything would have updated, and he would have been pwned. It is possible to personally defend …” View more
Ridealong summary
A recent supply chain attack on the Axios NPM package highlights the vulnerabilities in software dependency management. Hackers stole a developer's login, injected malicious code into the package, and exploited it to target millions of users before the breach was detected. This incident underscores the urgent need for tighter security measures in package management systems.
TBPN · AI Is Coming for Your Memes, Axios NPM Package Compromised, Claude Code Source Code Leak | Alex Pruden, Qasar Younis, Sebastian Mallaby, Forrest Heath, Dino Mavrookas, Will Ahmed, Jannick Malling, Ryan Daniels, Chris Yu · Mar 31, 2026
TBPN
“… clear overlaps in C2 infrastructure. Check the blog. And they wrote more about it on cloud.google.com. Mm-hmm. And yeah, we also have an expert from CrowdStrike coming on the show tomorrow. Adam Myers is going to come on and help us break it down, which we're very excited for. In a note to staff this morning, shared with Max Taney over at Semaphore, Business Insider said it is giving out a new quarterly AI award for best use of AI at the company. the winner gets $400 as soon as we talked about this this morning Tyler asked us to create a similar award seemingly signaling that he quite confident you …” “an updated backdoor previously used by the group alongside clear overlaps in C2 infrastructure. Check the blog. And they wrote more about it on cloud.google.com. Mm-hmm. And yeah, we also have an expert from CrowdStrike coming on the show tomorrow. Adam Myers is going to come on and help us break it down, which we're very excited for. In a note to staff this morning, shared with Max Taney over at Semaphore, Business Insider said it is giving out a new quarterly AI award for best use of AI at the company. the winner gets $400 as soon as we talked about this this morning Tyler asked us to create a similar award seemingly signaling that he quite confident you think you can win this one Tyler he could take it home every quarter I pretty confident right now We see Once the incentive goes out right Show me the incentive, I'll show you the outcome. We're going to have a lot of people in the office gunned for this. I still do want to run that experiment of the race to see the true leaderboard of how long it …” View more
Ridealong summary
A new quarterly AI award at Business Insider is igniting a coding competition among staff, with a $400 prize for the best AI usage. Tyler, a confident competitor, suggests a race to see who can generate 10,000 lines of code the fastest, highlighting the varying skill levels in the office. This playful challenge reveals the potential for innovation when incentives are introduced.
TBPN · Eddy Cue Joins for Apple's 50th, Artemis Launch, Jamie Dimon's Plan, Save Snap Now, SpaceX IPO | Aaron Terrazas, Pratap Ranade, Abhishek Das, Garry Tan, Brannin McBee, Sam Yagan · Apr 01, 2026
TBPN
“… like a kind of, just kind of a blatant sci-fi pump going into the IPO. Maybe. I will take the other side of that. But first, let me tell you about CrowdStrike. Your business is AI. Their business is securing it. CrowdStrike secures AI and stops breaches. And let me also tell you about the New York Stock Exchange. Want to change the world?” “… new facilities much quicker. But here we are. I think it makes total sense for Elon to make chips. I think it will make sense over time. for XAI to start offering cloud services to other companies. Having computers is valuable. But still, this seems like a kind of, just kind of a blatant sci-fi pump going into the IPO. Maybe. I will take the other side of that. But first, let me tell you about CrowdStrike. Your business is AI. Their business is securing it. CrowdStrike secures AI and stops breaches. And let me also tell you about the New York Stock Exchange. Want to change the world?” View more
Ridealong summary
Elon Musk's engineering prowess could potentially transform Intel's chip production capabilities, making him a surprising contender in the semiconductor industry. With the CHIPS Act aiming to boost American manufacturing, there's a scenario where Musk's efficiency could help Intel rapidly build new facilities. However, the reality of this partnership remains speculative as Musk focuses on other ventures like Twitter.
TBPN · The Great Peptide Debate, SpaceX's Lunar Mass Driver, AI Coming for Zuck's Job | Martin Shkreli & Max Marchione, Mitchell Green, Shane Hegde, Dr. Adam Oskowitz, Robin Vince, David Senra · Mar 23, 2026
TBPN
“… amount of cyber attacks and hacks and accidental releases, Like, even if it's not, you know, there's been, we had a member of the security team from CrowdStrike on the show last week talking about the rise in cyber attacks broadly, getting the most frontier models in the hands of big companies early. Great from that perspective. And then also just great as a product demo, which will get the entire organization excited about deploying the technology broadly. So very good as a B2B go-to-market motion. This makes a ton of sense. In some other more positive news, OpenAI, Anthropic, Google are uniting to …” “… that AI models will discover an avalanche of software bugs, and the effort is set to help companies stay one step ahead of cyber criminals and other threats. This feels like a very good rollout strategy generally, both because we've seen a huge amount of cyber attacks and hacks and accidental releases, Like, even if it's not, you know, there's been, we had a member of the security team from CrowdStrike on the show last week talking about the rise in cyber attacks broadly, getting the most frontier models in the hands of big companies early. Great from that perspective. And then also just great as a product demo, which will get the entire organization excited about deploying the technology broadly. So very good as a B2B go-to-market motion. This makes a ton of sense. In some other more positive news, OpenAI, Anthropic, Google are uniting to combat model copying in China. This is a bigger discussion around AI safety. We've talked about this. Give me a look at that. Who knew they could get along? Yes. I mean, I mean, I'm sure people in the chat have seen the New Yorker article where there's just tons and tons of quotes from various AI leaders, all, you know, upset with Sam Altman. And the …” View more
Ridealong summary
While Mythos AI raises safety concerns, its strategic rollout to major tech firms is seen as a proactive measure against cyber threats, highlighting both the risks and benefits of advanced AI systems.
AI's rapid advancement is both a cybersecurity asset and a source of inter-company drama, highlighting the high stakes and friction in the tech industry.
TBPN · Meta Tokenmaxxing, Intel Joins Terafab, Frontier AI vs. China | Diet TBPN · Apr 08, 2026
Mac OS Ken
“… NordLayer combines VPN, access control, and threat protection in one easy-to-use platform. That same $8 includes Falcon endpoint protection from CrowdStrike. That is enterprise-grade security that, yes, is still easy to use, easy to manage, and easy on the bottom line. They've got special rates for teams with 100 seats or more and an exclusive offer for macOS Ken listeners. Get up to 22% off NordLayer yearly plans plus 10% on top with offer code macOSKen-10-NordLayer at nordlayer.com slash macOSKen. Try it risk with their 14 money guarantee NordLayer Toggle network security built for your business …” “… and other threats has to be important, even if it's not always top of mind. What's great about NordLayer, it is top of mind for them. It protects against those threats and plenty of others, and at really reasonable rates. For just $8 per user per month, NordLayer combines VPN, access control, and threat protection in one easy-to-use platform. That same $8 includes Falcon endpoint protection from CrowdStrike. That is enterprise-grade security that, yes, is still easy to use, easy to manage, and easy on the bottom line. They've got special rates for teams with 100 seats or more and an exclusive offer for macOS Ken listeners. Get up to 22% off NordLayer yearly plans plus 10% on top with offer code macOSKen-10-NordLayer at nordlayer.com slash macOSKen. Try it risk with their 14 money guarantee NordLayer Toggle network security built for your business Get savings on top of savings with offer code macOSKen-10-nordlayer at nordlayer.com slash macOSKen. An odd story this week out of South Korea. Cult of Mac highlights a report from ZDNet Korea saying Apple's working on an OLED iMac. I say it's odd because, as the cult points out, OLED screens typically go into Apple's premium models. iMacs are …” View more
Ridealong summary
Apple might be developing an OLED iMac, but it won't arrive until at least 2029. While OLED screens offer superior color and contrast, the iMac has shifted away from being a premium product, raising questions about its market appeal. Creatives may prefer Mac Studios, leaving the future of the OLED iMac uncertain.
Mac OS Ken · Testing Begins on blankOS 26.5 - MOSK: 03.31.2026 · Mar 31, 2026
TBPN
“… to work together. Even if the supply chain thing doesn't go through and then Anthropa can vend technology through Project Glasswing, through CrowdStrike, through Oracle and other partners to Cisco so that at least the systems are secure because everyone wants that. Dean Ball has been on an absolute tear. We should have him back on the show and talk more. He says, is because of a combination of compute constraints, economic reality, competitive advantage, and safety concerns. Three means the most relevant models may be decreasingly legible to the general public. And depending on the extent and …” “… And we probably want a lot of competition between different companies to provide that service to the government. And so hopefully if the war comes to an end and there's different discussions can happen and ice can thaw and there's a way for these companies to work together. Even if the supply chain thing doesn't go through and then Anthropa can vend technology through Project Glasswing, through CrowdStrike, through Oracle and other partners to Cisco so that at least the systems are secure because everyone wants that. Dean Ball has been on an absolute tear. We should have him back on the show and talk more. He says, is because of a combination of compute constraints, economic reality, competitive advantage, and safety concerns. Three means the most relevant models may be decreasingly legible to the general public. And depending on the extent and duration of the coming compute squeeze, we could enter a market dynamic where the best models are only available to the highest bidder. And of course, that makes sense from a KYC and security perspective. In other words, where compute is a seller's market rather than a buyer's market. Interesting. Imagine competing firms in the economy bidding …” View more
Ridealong summary
As AI models become the fastest depreciating assets in history, companies are racing to secure the best technology for cybersecurity. With increasing compute constraints and economic realities, the most advanced models may only be accessible to the highest bidders. This creates a competitive landscape where security and governance become paramount for both businesses and the U.S. economy.
TBPN · Meta Drops New Model, Mythos, RoboLamp | Luther Lowe, Dan Primack, Lior Susan, Feross Aboukhadijeh, Qasim Mithani, Jaleh Rezaei, Jeremy Philip Galen · Apr 08, 2026
Limitless Podcast
“… the next three quarters. The market also very much felt the effects of this because, oh my God, these stock charts look absolutely horrendous. Yeah. CrowdStrike, which is like the major cybersecurity firm, was down a couple billion on the news. And Palo Alto Networks, which is another similar company that competes in this firm, also suffered from this. Now, these two charts that I'm looking at right now for these specific companies, Josh, gives me a little PTSD or deja vu because we were talking about this, I think, four weeks ago, when Anthropic released their security review Claude feature, which, …” “… at least that's part of the reason why we're not seeing it now but the second is it's going to be unbelievably powerful and the progress that we've had in the last year is going to probably look like nothing compared to what we're going to get for the next three quarters. The market also very much felt the effects of this because, oh my God, these stock charts look absolutely horrendous. Yeah. CrowdStrike, which is like the major cybersecurity firm, was down a couple billion on the news. And Palo Alto Networks, which is another similar company that competes in this firm, also suffered from this. Now, these two charts that I'm looking at right now for these specific companies, Josh, gives me a little PTSD or deja vu because we were talking about this, I think, four weeks ago, when Anthropic released their security review Claude feature, which, you know, wasn't anything to do about Mythos, but basically helped review the Vibe code that you produced using Claude. And so cybersecurity stocks dumped again. This is happening seemingly on a monthly basis at this point.” View more
Ridealong summary
The leak of Anthropic's Claude Mythos model reveals both groundbreaking AI capabilities and significant cybersecurity risks, highlighting the dual-edged nature of advanced AI development.
The leak of Anthropic's Claude Mythos model highlights both its groundbreaking capabilities and the significant cybersecurity risks it poses, preventing its public release.
The leak of Anthropic's Claude Mythos model reveals a step change in AI performance but also highlights significant cybersecurity risks that prevent its public release.
The Mythos AI model is so advanced that it poses a cybersecurity threat, preventing its public release due to potential misuse.
The Claude Mythos leak highlights the intense competition and security challenges in AI, overshadowing OpenAI's funding news.
Anthropic's Mythos AI is so advanced it poses a cybersecurity threat, prompting a cautious pause in its release.
The Anthropic Claude Mythos leak reveals a model so advanced it's considered a cybersecurity threat, highlighting the risks of rapid AI advancements.
Limitless Podcast · Claude Mythos: Anthropic's Leak That's Too Dangerous to Release · Mar 31, 2026
TBPN
“… is that in order to understand how to fight something, you'd have to know how to build it. And this is true. I mean, I'm sure that the folks at CrowdStrike or Palo Alto Networks could definitely, if they went black hat, it would be bad for everyone, even in the pre-AI era. And that remains true. And so having at least as much economic incentive as possible to put the resources and the tokens and the inference budgets towards like white hat hacking is good. There's also somebody in the chat is making the comment that there's a lot of precedent for this with bug bounties and like time disclosures. …” “… checking to see if there's big security vulnerabilities. Even right now, you can just ask codecs, whatever, you're building something, are there errors? Are there security problems? And it'll solve them. And this is the nature of every advanced model, is that in order to understand how to fight something, you'd have to know how to build it. And this is true. I mean, I'm sure that the folks at CrowdStrike or Palo Alto Networks could definitely, if they went black hat, it would be bad for everyone, even in the pre-AI era. And that remains true. And so having at least as much economic incentive as possible to put the resources and the tokens and the inference budgets towards like white hat hacking is good. There's also somebody in the chat is making the comment that there's a lot of precedent for this with bug bounties and like time disclosures. So oftentimes white hat hackers will go to companies and say, we found a really bad vulnerability. We're giving you 90 days until we publish it. But it is in the public interest to know that this vulnerability exists broadly. So we have to release it but also we want to give you the time to react to this And so it feels like you sort of holding that …” View more
Ridealong summary
AI could be a double-edged sword in cybersecurity, as coding agents may inadvertently expose vulnerabilities. The discussion highlights the tension between white hat hackers and companies, emphasizing the need for transparency and responsible disclosure. Ultimately, the future may require stricter KYC protocols to mitigate risks associated with AI misuse.
TBPN · Jassy's Shareholder Letter, The Next AI Capability, 𝕏 Timeline Reactions | Saagar Enjeti, Joe Weisenthal, Kesava Kirupa Dinakaran, Brian Manning, Cobi Blumenfeld-Gantz, Changpeng Zhao, Tal Hoffman · Apr 09, 2026

Top Podcasts About CrowdStrike

TBPN
TBPN
9 episodes
CISO Series Podcast
CISO Series Podcast
1 episode
The AI Daily Brief: Artificial Intelligence News and Analysis
The AI Daily Brief: Artificial Intelligence News and Analysis
1 episode
Mac OS Ken
Mac OS Ken
1 episode
Limitless Podcast
Limitless Podcast
1 episode