In this episode, Brad and Spencer discuss the nuances around scoping offensive security engagements. Scoping an offensive security engagement involves defining boundaries, objectives, and […]
Subscribe to the CyberThreatPOV Podcast
Episode 48: Authentication done right!
 In this episode, Brad and Darrius talk about Authentication and what issues they routinely see while performing penetration tests. They talk about MFA, Passwords, […]
Episode 47: How to Sharpen your Sword as a Pentester
 In this episode Spencer, Darrius and Tyler get together for a round-table discussion on sharpening your sword as a pentester. They discuss what they […]
Episode 46: Reducing Active Directory Security Risks from a Hackers Perspective
 In this episode Spencer and Darrius discuss and explore Active Directory security risks from a hacker’s point of view. They discuss various techniques and […]
Episode 45: Our Most Common External Pen Test Findings
 In this episode, Tyler and Brad talk about the most common external penetration test findings. We see these findings over and over again and […]
Episode 44: Should Penetration Testers Know How To Code?
 In this episode, Darrius and Brad talk about the need for coding skills in the offensive security world. There’s some fun with regard to […]
Episode 43: Hacking for Good – Insights and Inspiration with John Hammond
 In this episode, John Hammond joins us on the show! We talk about John’s background and how he got interested in computers, how he […]
Episode 42: OSINT – What You Don’t Know Can Hurt You
 OSINT – Open Source Intelligence: is the process of collecting and analyzing publicly available information in order to achieve some goal or facilitate some kind of […]
Episode 41: Security Assessment vs Pentest Which is More Impactful and Why
 In this episode, Brad, Spencer, and Tyler discuss the major differences and pros and cons of Security Assessments and Penetration Tests. In the end […]
Episode 40: How Attackers Target Law Firms and How To Detect & Prevent It
 It’s no secret law firms have become prime targets for attackers due to the sensitive information they handle and the clients they do business […]