Podcast Episodes
Back to SearchEpisode 136: A day in the life of an External Penetration Tester
Season 1 Episode 136
In this episode of The Cyber Threat Perspective, we dive into why a “A day in the life of an External Penetration Tester." What do we actually do, an…
7 months, 1 week ago
(Replay) How To Harden Active Directory To Prevent Cyber Attacks - Webinar
(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their de…
7 months, 2 weeks ago
Episode 135: We Couldn’t Get In...And That’s a Good Thing, Or Is It?
Season 1 Episode 135
In this episode of The Cyber Threat Perspective, we dive into why a “we couldn’t get in” result on a pentest isn’t always the victory it seems—and wh…
7 months, 3 weeks ago
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
Season 1 Episode 134
In this episode of The Cyber Threat Perspective, we tackle the crucial first step in cybersecurity: preventing initial compromise. We'll dissect comm…
8 months ago
Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions
Season 1 Episode 133
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to sys…
8 months, 1 week ago
Episode 132: Reviewing the Mandiant M-Trends 2025 Report
Season 1 Episode 132
In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its …
8 months, 2 weeks ago
(Replay) How To Defend Against Lateral Movement
In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and Powe…
8 months, 3 weeks ago
Episode 131: DMARC & PCI 4.0 Compliance - Is your Organization Compliant?
Season 1 Episode 131
In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about D…
9 months ago
Episode 130: Using Deception Technology to Detect Cyber Attacks
Season 1 Episode 130
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your c…
9 months, 1 week ago
Episode 130: Using Deception Technology to Detect Cyber Attacks
Season 1 Episode 130
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your c…
9 months, 1 week ago