The Cyber Threat Perspective
Загальна тривалість:
22 h 28 min
Episode 92: Cybersecurity Training and Certification Advice
The Cyber Threat Perspective
34:32
Episode 91: The 2024 Verizon Data Breach Investigations Report
The Cyber Threat Perspective
42:19
Episode 90: Transforming Your Security - Insights from Coaching a Collegiate Cyber Defense Team
The Cyber Threat Perspective
44:38
Episode 89: How to Actually Protect Credentials
The Cyber Threat Perspective
43:31
Episode 88: Budgeting for Security: Optimizing Penetration Testing Investments
The Cyber Threat Perspective
25:15
Episode 87: Pentesting Challenges and How to Overcome Them
The Cyber Threat Perspective
57:33
Episode 86: The XZ Backdoor
The Cyber Threat Perspective
35:39
Episode 85: Tool Time - DarkGPT
The Cyber Threat Perspective
27:42
Episode 84: How We Hack Medical Devices to Save Lives
The Cyber Threat Perspective
36:12
Episode 83 - Defense in Depth
The Cyber Threat Perspective
30:22
Ep82 - DFIR For IT & Security Leadership
The Cyber Threat Perspective
55:44
Ep81 - Pentesting Misconceptions
The Cyber Threat Perspective
24:37
Ep 80: Low-Cost, High-Impact Security
The Cyber Threat Perspective
29:28
Episode 79: Bug Bounties
The Cyber Threat Perspective
28:31
Episode 78: Tales from the Trenches
The Cyber Threat Perspective
57:06
Episode 77: DNS Security
The Cyber Threat Perspective
31:12
Episode 76: Windows & Active Directory Hardening
The Cyber Threat Perspective
47:58
Episode 75: Assume Breach - Extracting Maximum Value From Offensive Security Testing
The Cyber Threat Perspective
41:12
Episode 74: Soft Skills and Mental Health For Security Professionals
The Cyber Threat Perspective
38:04
Episode 73: Password Spraying Inside & Out
The Cyber Threat Perspective
34:40
Episode 72: Vulnerability Management Deep Dive
The Cyber Threat Perspective
35:42
Episode 71: A CISO's Perspective on Offensive Security Services
The Cyber Threat Perspective
34:25
Episode 70: Future Trends in Penetration Testing Part 2
The Cyber Threat Perspective
31:36
Episode 69: Future Trends in Penetration Testing Part 1
The Cyber Threat Perspective
24:32
Episode 68: The evolution of penetration testing TTPs
The Cyber Threat Perspective
18:43
Episode 67: A Day In The Life: External Penetration Testing
The Cyber Threat Perspective
29:06
(Replay) HACKERS: How we GET IN and how to STOP US
The Cyber Threat Perspective
34:26
Episode 66: The DevSec Divide: Breaking Down Barriers for Better Security
The Cyber Threat Perspective
18:46
11/2023 Cyber Threat Recap: Okta, Octo Temptest, Smishing
The Cyber Threat Perspective
15:07
Episode 65: Unsecured Credentials and Where To Find Them
The Cyber Threat Perspective
35:02
Episode 64: A Day In The Life: Web Application Penetration Testing
The Cyber Threat Perspective
34:31
Episode 63: A Day in The Life: Internal Penetration Testing
The Cyber Threat Perspective
29:48
Episode 62: What Makes a Great Penetration Test Report?
The Cyber Threat Perspective
28:13
Episode 61: How to Mitigate Social Engineering Attacks
The Cyber Threat Perspective
26:57
Episode 60: Cybersecurity Hot Takes
The Cyber Threat Perspective
34:51
Episode 59: Offensive TTPs and Tooling Trends
The Cyber Threat Perspective
31:59
Episode 58: How To Identify and Mitigate Insecure Windows Services
The Cyber Threat Perspective
30:36
Episode 57: Find and FIX AD CS Vulnerabilities Using Locksmith with Jake and Sam
The Cyber Threat Perspective
38:29
Episode 56: Vulnerabilities & Severity - Explain It To Me Like I'm 5
The Cyber Threat Perspective
25:49
Episode 55: What If Your EDR Doesn't Detect or Respond?
The Cyber Threat Perspective
23:58