In this episode of The Cyber Threat Perspective, Brad and Darrius delve into the world of bug bounties, discussing the pros and cons of […]
Subscribe to the CyberThreatPOV Podcast
Episode 78: Tales From The Trenches
 In this episode of The Cyber Threat Perspective, Brad Causey, VP of Offensive Security at SecurIT360, shares real stories and lessons learned during offensive […]
Demystifying STRONG Passwords
Introduction Have you ever received the advice, “use a strong password.”? I’m sure most of you have. Maybe in your personal life by a family […]
Episode 77: DNS Security
 In our “DNS Security” podcast, we delve into DNS’s critical role in how the internet works, exploring its vulnerabilities and attacks like DNS spoofing, […]
Episode 76: Windows and Active Directory Hardening
In this episode of The Cyber Threat Perspective, Nathan and Spencer discuss crucial strategies for Windows and Active Directory hardening, emphasizing the importance of community […]
Episode 75: Assume Breach – Extracting Maximum Value From Offensive Security Testing
This session aims to shed light on the concept of “Assume Breach” and explore how organizations can extract the most value from their penetration tests. […]
Episode 74: Soft Skills and Mental Health For Security Professionals
Tune in to Episode 74 of The Cyber Threat Perspective as Darrius, Spencer, and Brad dive into the crucial soft skills and mental health considerations […]
Episode 73: Password Spraying Inside & Out
 In this episode, we discuss password spraying, a favorite technique among attackers who are trying to compromise organizations. Spencer and Tyler discuss external and […]
Episode 72: Vulnerability Management Deep Dive
 In this episode, Spencer is joined by Daniel Perkins, a Senior Information Security Officer at SecurIT360 to discuss the intricacies of vulnerability management, the […]
Episode 71: A CISO’s Perspective on Offensive Security Services
 In this episode, Zach Sims (Information Security Officer at SecurIT360) provides valuable insights into offensive security services from the perspective of a security leader. […]