Learn practical strategies to prevent data breaches before they happen. This episode unpacks the latest trends and actionable defenses to help you stop initial compromises […]
Subscribe to the CyberThreatPOV Podcast
Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions
Credential theft and session hijacking are rapidly evolving threats, with attackers using increasingly advanced tactics to compromise identities in the cloud. In this episode, Spencer […]
Episode 132: Reviewing the Mandiant M Trends 2025 Report
Curious about the latest cyber threat trends? In this episode, Brad and Spencer break down the key findings from the Mandiant M-Trends 2025 Report and […]
Episode 131: DMARC & PCI 4.0 Compliance – Is Your Organization Compliant?
Learn about the latest changes in PCI compliance and how DMARC plays a crucial role in email security with hosts Brad and Tyler. This episode […]
Episode 130: Using Deception Technology to Detect Cyber Attacks
Unlock the power of deception technology to bolster your cyber defense strategy in this episode of The Cyber Threat Perspective. Discover practical tips and techniques […]
Episode 129: How to Analyze Threat Reports for Defenders
Threat reports can be goldmines for defenders — but only if we know how to extract and apply what matters. A good analysis can mean […]
Episode 128: The Most Common External Pen Test Findings—And How to Fix Them
In this episode of “The Cyber Threat Perspective,” Brad and Sam dive into the most common external penetration test findings and offer solutions. Gain insights […]
Episode 127: SaaS Supply Chain Attacks – How to Stay Secure
In this episode of “The Cyber Threat Perspective,” Spencer and Brad dive into the complex world of SaaS supply chain attacks, sharing their insights on […]
Episode 126: Typosquatting – How and Why It Works and How To Defend Against It
In this episode of The Cyber Threat Perspective, we dive deep into the world of typosquatting, exploring what it entails and how organizations can protect […]
Episode 125: Whose Job Is Harder, Red Team or Blue Team?
In this episode of The Cyber Threat Perspective, we dive into the age-old debate: is it harder to be on the red team or the […]