In this episode Brad is joined by Matt Tesauro to talk all things OWASP, API Hacking and DevSec. Matt Tesauro is a Distinguished Engineer […]
Subscribe to the CyberThreatPOV Podcast
Episode 15: Pentesting Certifications – which to get and why
 Are you looking for your first job in penetration testing? Perhaps you’re looking to advance and up your skills or maybe you’re a manager […]
Episode 14: Offensive Security Testing Part 3 – Web App Pentesting
This is part 3 of a multi-episode series where the Offsec group at SecurIT360 dives into the details of various Offensive Security Tests, what they […]
Episode 13: Offensive Security Testing Part 2 – Mobile Pentesting
 Introduction Have you ever wondered why your mobile application isn’t allowed to be published in the app store? Has the mobile application undergone a […]
Episode 12: Law Firm Security Challenges Live at LegalSec22
 Coming at you LIVE from LegalSec22 in San Antonio Texas. In this episode Brad and Spencer discuss common security challenges that are unique to […]
Episode 11: Offensive Security Testing Part 1 – Internal Pentesting
 *Check out our podcast and YouTube video released on 10/12/22, where we talk about this subject. Hope to see you there! Introduction Have you […]
Episode 10: Web Application Threats in the Modern Landscape
 *Check out our podcast and youtube video released on 10/5/22, where we talk about this subject. Hope to see you there! Introduction Web […]
Episode 9: Breaking In Or Branching Out: How To Get A Job In Cybersecurity
 There’s essentially a 0% unemployment rate in cybersecurity. It’s a very hot field, great job security, great pay and great mission. But, with that […]
Episode 8: Hackers: How we get in and how to stop us
 In this episode Brad and Spencer discuss the THREE primary ways we gain initial access on penetration tests and how to stop […]
9-16-22 Week in Review: Uber Hacked, Teams Cleartext Tokens, Intermittent Ransomware Encryption
 In this week’s review Uber was hacked Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs Ransomware Developers Turn to Intermittent Encryption […]