
Episode 154: Pentesting on a Budget for IT Admins
The Cyber Threat Perspective
00:00
Methodology Step: Test Security Monitoring with Threat Reports
Spencer recommends using threat reports to identify TTPs to test detections safely and run controlled purple-team-style checks.
Transcript
Play full episode


