PodcastsTechnologyThe Cyber Threat Perspective

The Cyber Threat Perspective

SecurIT360
The Cyber Threat Perspective
Latest episode

202 episodes

  • The Cyber Threat Perspective

    Episode 166: Why Your Pentest Didn’t Make You Safer

    2026/1/30 | 39 mins.
    In this episode, we explore why many organizations invest in penetration testing yet see little improvement in their actual security posture. We discuss the common pitfalls of treating pentests as one-time events, how attackers operate very differently from scoped assessments, and why remediation—not the report—is what determines real safety. If you’ve ever wondered why “passing” a pentest didn’t translate into stronger defenses, this episode is for you.
    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov
    Follow Spencer on social ⬇
    Spencer's Links: https://go.spenceralessi.com/links
    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
  • The Cyber Threat Perspective

    Episode 165: What to expect on your API Pentest

    2026/1/23 | 33 mins.
    In this episode, Brad and Jordan talk about API pen testing, how it works, and what you can expect if you want to procure one. They discuss pitfalls, common findings, and ways to streamline the process. 
    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov
    Follow Spencer on social ⬇
    Spencer's Links: https://go.spenceralessi.com/links
    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
  • The Cyber Threat Perspective

    Episode 164: Offensive Security in the Age of AI: What Has Changed

    2026/1/16 | 35 mins.
    In this episode, we take a step back from the AI hype and focus on what has actually changed in offensive security. AI isn’t replacing attackers or inventing brand-new techniques, but it is dramatically reducing friction across the attack lifecycle. We break down the myths, explain where AI is already impacting real-world attacks, and walk through how defenders need to adapt if they want to keep up.
    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov
    Follow Spencer on social ⬇
    Spencer's Links: https://go.spenceralessi.com/links
    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
  • The Cyber Threat Perspective

    Episode 163: The Vendor Security Trap: Are You Losing Control?

    2026/1/09 | 34 mins.
    In this episode, we dissect the dangerous trend of organizations ceding control of their security strategy to vendors, exploring the pitfalls of vendor lock-in, overspending, and the illusion of comprehensive protection. We'll provide actionable steps to reclaim your security posture and build an independent strategy tailored to your specific needs.
    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov
    Follow Spencer on social ⬇
    Spencer's Links: https://go.spenceralessi.com/links
    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
  • The Cyber Threat Perspective

    Episode 162: Before the Breach How Attackers Profile Your Organization

    2025/12/19 | 36 mins.
    In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what data is truly "sensitive" from an external attacker's perspective. Learn how organizations can realistically assess their external attack surface beyond automated scanning and discover creative OSINT techniques defenders can use to mimic attacker reconnaissance.
    Blog: https://offsec.blog/
    Youtube: https://www.youtube.com/@cyberthreatpov
    Twitter: https://x.com/cyberthreatpov
    Follow Spencer on social ⬇
    Spencer's Links: https://go.spenceralessi.com/links
    Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

More Technology podcasts

About The Cyber Threat Perspective

Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting [email protected]
Podcast website

Listen to The Cyber Threat Perspective, Search Engine and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.3.1 | © 2007-2026 radio.de GmbH
Generated: 1/31/2026 - 5:48:47 AM