In this episode, we discuss the broad concept of risk, what it is, and how to manage it. This episode is a great way to […]
Subscribe to the CyberThreatPOV Podcast
Episode 114: Making Penetration Test Results Actionable
In this episode of The Cyber Threat Perspective, Spencer and Brad discuss the crucial steps to make penetration test results actionable. Learn how to turn […]
Episode 113: Phishing With Malicious RDP Files
Join Brad and Spencer from SecurIT360 as they dive into the latest phishing techniques involving malicious RDP files. Stay informed on how to protect your […]
Episode 112: Key Insights From The Microsoft Digital Defense Report 2024
Get the essential takeaways from the Microsoft Digital Defense Report 2024 in this episode. Brad and Spencer discuss the latest cybersecurity trends, threats, and actionable […]
Episode 111: Red Team Tools (OST) – Managing Open-Source Threats
Join Brad and Spencer from SecurIT360 as they dive into the complexities and ethical dilemmas surrounding red team tools in cybersecurity. In this episode, they […]
Episode 110: AD Security Workshop Preview
Join Brad and Spencer from SecurIT360’s Offensive Security Group as they preview an upcoming conference workshop on Active Directory (AD) Security. Discover practical insights and […]
Episode 109: Current State of Pentesting – Internal and External
Join us for Episode 109 of “The Cyber Threat Perspective” where Spencer and Tyler dive into the current state of penetration testing. From client engagements […]
Episode 108: New Tales From The Trenches!
Welcome to Episode 108 of The Cyber Threat Perspective! Join Tyler and Brad as they dive into the latest behind-the-scenes tales from their penetration testing […]
Episode 107: How To Defend Against Lateral Movement
 Protect your network from lateral movement attacks! In this episode, Brad and Spencer from SecurIT360’s offensive security group share essential tips and strategies. Definition […]
Episode 106: An Overview of Cyber Risk
In this episode of The Cyber Threat Perspective, Brad and Tyler dive deep into the different types of cyber risks that organizations face. They provide […]