The Cyber Threat Perspective
Total duration:
26 h 21 min
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
40:44
Episode 138: The 7 Questions Every Security Leader Should Ask After a Pentest
The Cyber Threat Perspective
42:16
Episode 137: Common Pentest Findings That Shouldn’t Exist in 2025
The Cyber Threat Perspective
27:23
Episode 136: A day in the life of an External Penetration Tester
The Cyber Threat Perspective
37:32
(Replay) How To Harden Active Directory To Prevent Cyber Attacks - Webinar
The Cyber Threat Perspective
60:04
Episode 135: We Couldn’t Get In...And That’s a Good Thing, Or Is It?
The Cyber Threat Perspective
41:45
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
The Cyber Threat Perspective
47:20
Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions
The Cyber Threat Perspective
31:51
Episode 132: Reviewing the Mandiant M-Trends 2025 Report
The Cyber Threat Perspective
42:23
(Replay) How To Defend Against Lateral Movement
The Cyber Threat Perspective
37:48
Episode 131: DMARC & PCI 4.0 Compliance - Is your Organization Compliant?
The Cyber Threat Perspective
28:19
Episode 130: Using Deception Technology to Detect Cyber Attacks
The Cyber Threat Perspective
46:31
Episode 129: How to Analyze Threat Reports for Defenders
The Cyber Threat Perspective
49:51
Episode 128: The Most Common External Pen Test Findings—And How to Fix Them
The Cyber Threat Perspective
34:57
Episode 127: SaaS Supply Chain Attacks - How to Stay Secure
The Cyber Threat Perspective
42:53
Episode 126: Typosquatting - How and Why It Works and How to Defend Against It
The Cyber Threat Perspective
31:37
Episode 125: Whose Job Is Harder? Red or Blue
The Cyber Threat Perspective
55:30
(Replay) How To Monitor Your Attack Surface
The Cyber Threat Perspective
35:12
Episode 124: MFA != Secure
The Cyber Threat Perspective
54:21
Episode 123: Insecure Active Directory Protocols
The Cyber Threat Perspective
39:47
Episode 122: AI/ChatGPT Interviews a Web Pen Tester!!
The Cyber Threat Perspective
15:02
Episode 121: How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
40:44
Episode 120: Demystifying Pentests: What Every Organization Needs to Know
The Cyber Threat Perspective
40:38
Episode 119: Lessons Natural Disasters Can Teach Us About Cybersecurity
The Cyber Threat Perspective
45:33
(Replay) Tales From The Trenches
The Cyber Threat Perspective
57:06
(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions
The Cyber Threat Perspective
27:10
(Replay) Windows and Active Directory Hardening
The Cyber Threat Perspective
47:58
Episode 118: 2025 - A CISO's Perspective with Mike Whitt
The Cyber Threat Perspective
46:26
Episode 117: Why Do Pentests Cost So Much?
The Cyber Threat Perspective
39:03
Episode 116: Painfully Persistent Problems - Weak Passwords
The Cyber Threat Perspective
35:52
Episode 115: How to understand and address risk w/ Robert McElroy
The Cyber Threat Perspective
40:25
Episode 114: Making Penetration Test Results Actionable
The Cyber Threat Perspective
38:07
Episode 113: Phishing with Malicious RDP Files
The Cyber Threat Perspective
28:14
Episode 112: Key Insights From The Microsoft Digital Defense Report 2024
The Cyber Threat Perspective
38:45
(Replay) How To Actually Protect Credentials
The Cyber Threat Perspective
43:31
Episode 111: Red Team Tools (OST) Managing Open-Source Threats
The Cyber Threat Perspective
31:04
(Replay) Vulnerability Management Deep Dive
The Cyber Threat Perspective
35:42
Episode 110: AD Security Workshop Preview
The Cyber Threat Perspective
23:28
Episode 109: Current State of Pentesting - Internal and External
The Cyber Threat Perspective
39:41
Episode 108: New tales from the trenches!
The Cyber Threat Perspective
38:38