Welcome to Episode 108 of The Cyber Threat Perspective! Join Tyler and Brad as they dive into the latest behind-the-scenes tales from their penetration testing […]
Subscribe to the CyberThreatPOV Podcast
Episode 107: How To Defend Against Lateral Movement
 Protect your network from lateral movement attacks! In this episode, Brad and Spencer from SecurIT360’s offensive security group share essential tips and strategies. Definition […]
Episode 106: An Overview of Cyber Risk
In this episode of The Cyber Threat Perspective, Brad and Tyler dive deep into the different types of cyber risks that organizations face. They provide […]
Episode 105: How To Monitor Your Attack Surface
Unlock the secrets of effective attack surface monitoring in this episode of The Cyber Threat Perspective. Brad and Spencer dive into essential practices, tools, and […]
Episode 104: How To Get Into Cyber For First Responders
Join us in this episode as we talk with Sam Killingsworth, a pen tester and career firefighter paramedic, about transitioning into a cybersecurity career. Discover […]
Episode 103: Email Spoofing and Cybersecurity: Misconfigurations, Protections, and Mitigations
Welcome to The Cyber Threat Perspective! In this episode, Brad and Spencer dive into the mechanics and recent developments of email spoofing, shedding light on […]
Episode 102: The Global CrowdStrike Outage
In this episode of The Cyber Threat Perspective, we dive into the recent global CrowdStrike outage and its far-reaching implications. Join us as we break […]
Episode 101: Infostealers – 10000 Victims a Day
 In this episode of “The Cyber Threat Perspective,” hosts Spencer and Brad dive into the intricate world of InfoStealer malware, which affects 10,000 victims […]
Episode 100: The OpenSSH RegreSSHion Vulnerability
In this episode of The Cyber Threat Perspective, Brad and Spencer dive into the OpenSSH RegreSSHion Vulnerability, discussing its implications and defense mechanisms. You won’t […]
Episode 99: ToolTime – OneDriveEnum and AD Miner
 In this episode, we dive into two powerful tools, OneDriveEnum and AD Miner, and explore their unique features and usage in cybersecurity engagements. Join […]