Cyber Magazine March 2025 | Page 100

THE CYBER INTERVIEW
generating and the victims they were interacting with and this ignited the passion for hunting down these threat actors and finding out who they were and how to stop them .”
That experience shaped the development of CrowdStrike ’ s threat response capabilities . From the company ’ s inception , Adam says the focus has remained consistent : “ CrowdStrike ’ s philosophy has been : ‘ You don ’ t have a malware problem , you have an adversary problem .’ This guiding principle has shaped our approach to cybersecurity . Instead of merely reacting to threats , we anticipate them , which requires deep intelligence work .”
CrowdStrike builds global network to track emerging threats The scale of modern cyber threats requires continuous monitoring across multiple time zones . CrowdStrike has structured its operations to provide 24-hour coverage , drawing on intelligence community practices . “ The team is built using a lot of lessons learned from the intelligence community over many years in terms of how to track adversaries , produce continuous reporting on those adversaries and adapt the platform to rapidly detect and outpace new threats ,” Adam explains .
This approach has evolved to address emerging threat patterns that span traditional security boundaries . “ We ’ ve observed a rise in cross-domain threats , where adversaries operate across multiple attack surfaces – identity , endpoint and cloud . Our team has adapted by connecting the dots between these domains , combining intelligence and telemetry to uncover patterns that would be invisible if viewed in isolation .”
North Korean infiltration campaign targets western aerospace sector Among the most significant threats identified by Adam ’ s team is an operation by FAMOUS CHOLLIMA , a North Korea -linked threat actor . The group has infiltrated more than 100 US-based
100 March 2025