Introduction In the ever-evolving landscape of cybersecurity, securing your Windows environment is paramount to safeguarding your organization and data. However, even with its built-in security […]
Subscribe to the CyberThreatPOV Podcast
Episode 41: Security Assessment vs Pentest Which is More Impactful and Why
 In this episode, Brad, Spencer, and Tyler discuss the major differences and pros and cons of Security Assessments and Penetration Tests. In the end […]
Episode 40: How Attackers Target Law Firms and How To Detect & Prevent It
 It’s no secret law firms have become prime targets for attackers due to the sensitive information they handle and the clients they do business […]
Episode 39: Pentesting Certifications Tier List Part 2
 This is part 2 of a 2 part series where Spencer, Darrius and Tyler talk about pentesting certifications and where they fall on a […]
Episode 38: Pentesting Certifications Tier List Part 1
 This is part 1 of a 2 part series where Spencer, Darrius and Tyler talk about pentesting certifications and where they fall on a […]
Episode 37: Offensive Security Testing Part 5 – Wireless Pentesting
 In this episode Brad and Darrius continue the Offensive Security Testing series and discuss Wireless Penetration Testing. Wireless Pentesting is often overlooked, but could […]
Episode 36: Pentest vs Purple Team vs Red Team
In this episode Brad and Spencer discuss the differences between a Penetration Test, Purple Team Exercise and a Red Team Engagement. The goal of this […]
Episode 35: Getting Into Pentesting Without an IT Background
 In this episode, Spencer and Tyler discuss Tyler’s journey from working at Home Depot to getting a job as a Penetration Tester. They also […]
Episode 34: The State of Web Application Penetration Testing
 In this episode, Darrius and Brad look at the current state of web application penetration testing, why it is how it is, and what […]
Episode 33: Reflections on Privacy Laws and Privacy Issues
 In this episode, Brad and Darrius talk about some of the buzz around recent changes in privacy regulation/law and how it may impact other […]