The Cyber Threat Perspective cover image

Episode 75: Assume Breach - Extracting Maximum Value From Offensive Security Testing

The Cyber Threat Perspective

00:00

How do traditional network pen tests differ from realistic attacker behavior?

Spencer contrasts unauthenticated network tests with real attacks that start from compromised user endpoints.

Play episode from 07:12
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app