Podcast Episodes
Back to Search(Replay) How To Harden Active Directory To Prevent Cyber Attacks - Webinar
(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their de…
9 months, 2 weeks ago
Episode 135: We Couldn’t Get In...And That’s a Good Thing, Or Is It?
Season 1 Episode 135
In this episode of The Cyber Threat Perspective, we dive into why a “we couldn’t get in” result on a pentest isn’t always the victory it seems—and wh…
9 months, 3 weeks ago
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
Season 1 Episode 134
In this episode of The Cyber Threat Perspective, we tackle the crucial first step in cybersecurity: preventing initial compromise. We'll dissect comm…
10 months ago
Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions
Season 1 Episode 133
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to sys…
10 months, 1 week ago
Episode 132: Reviewing the Mandiant M-Trends 2025 Report
Season 1 Episode 132
In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its …
10 months, 2 weeks ago
(Replay) How To Defend Against Lateral Movement
In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and Powe…
10 months, 3 weeks ago
Episode 131: DMARC & PCI 4.0 Compliance - Is your Organization Compliant?
Season 1 Episode 131
In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about D…
11 months, 1 week ago
Episode 130: Using Deception Technology to Detect Cyber Attacks
Season 1 Episode 130
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your c…
11 months, 2 weeks ago
Episode 130: Using Deception Technology to Detect Cyber Attacks
Season 1 Episode 130
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your c…
11 months, 2 weeks ago
Episode 129: How to Analyze Threat Reports for Defenders
Season 1 Episode 129
Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean catching an attac…
11 months, 2 weeks ago