In this episode Brad and Spencer discuss some of the more, interesting, pentest engagements they’ve been on. The goal of this episode is to […]
Subscribe to the CyberThreatPOV Podcast
Episode 30: LastPass DataBreach Updates
 In this episode, Brad and Spencer discuss the newly released information surrounded the 2022 LastPass data breach. They discuss potential controls that may have […]
Episode 29: Critical Vulnerabilities You WON’T Find Using Nessus
 In this episode Brad and Spencer vulnerabilities that are not detected by vulnerability scanning tools such as Nessus and explored several methods that can […]
Hidden Danger: How To Identify and Mitigate Insecure Windows Services
Introduction Services, in Windows, are a critical component of the operating system and provide essential functions that keep our computers running smoothly, and hopefully securely. […]
Episode 27: Password Myths Misconceptions and Lies
 In this episode Brad and Spencer discuss all the bad advice that’s been given over the years regarding passwords and they provide insights into […]
Episode 26 – Cloud Security Quick Wins for Defenders
 In this episode Spencer and Darrius discuss a variety of things you can and should be doing to secure your cloud environments. While the […]
Episode 25 – What To Do Before You Get A Pentest
 In this episode Spencer, Darrius and Brad answer the question: “What do I need to do before I have someone pentest my network or […]
Be Smart: Hire a Hacker
The job of IT IT people, you are some of the busiest. Think about it. You’ve got to not only keep the lights on but […]
Episode 24: Active Directory Security Quick Wins For Defenders
 In this episode Spencer and Darrius discuss some seriously free and relatively “easy” quick wins for hardening your Active Directory and internal environment. We […]
Episode 23 – Offensive Security Testing Part 4 – External Pentesting
 In this episode Spencer and Tyler continue the Offensive Security Testing series and discuss External Penetration Testing. We discuss all things external pentesting including […]