The Cyber Threat Perspective

SecurIT360
undefined
Dec 25, 2024 • 27min

(Replay) Email Spoofing: From Basics to Advanced Techniques and Solutions

Dive into the intricate world of email spoofing, where attackers impersonate trusted sources to launch phishing campaigns. Explore the alarming rise in spoofed emails and the technological misconfigurations fueling this threat. The discussion covers essential security protocols like SPF, DKIM, and DMARC, highlighting their role in protecting against spoofing. Personal insights reveal the impact of automated spam scoring on email classification. Stay informed on the evolving tactics of cybercriminals and the importance of robust email security solutions.
undefined
Dec 18, 2024 • 48min

(Replay) Windows and Active Directory Hardening

In this episode of The Cyber Threat Perspective, Nathan and Spencer discuss crucial strategies for Windows and Active Directory hardening, emphasizing the importance of community collaboration and the value of using CIS benchmarks for security compliance.In this episode, we cover:Implementing multi-factor authentication for domain adminsThe benefits and importance of using CIS benchmarks for Windows 10 and 11Advantages of having a consistent standard in an active directory environmentAssurance and verification tools available in the benchmarksSimulated environment testing and active community participation for benchmark improvementBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com
undefined
Dec 11, 2024 • 46min

Episode 118: 2025 - A CISO's Perspective with Mike Whitt

In this episode, we’re discussing what a seasoned CISO is focused on going into 2025. Mike Whitt is a Cheif Information Security Officer in the financial sector with over 20 years of experience building teams, security programs, and leading organizations to a more secure posture. https://www.linkedin.com/in/mike-whitt-a4b4802/Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com
undefined
Dec 4, 2024 • 39min

Episode 117: Why Do Pentests Cost So Much?

This discussion uncovers the high costs of penetration testing and whether they're justified. Listeners will learn about the staggering financial toll data breaches take on various industries. It dives deep into the hidden costs related to security incidents, including lost trust and recovery expenses. The value of human expertise in pentesting is emphasized over automated solutions. Ultimately, proactive security investments are framed as essential to avoiding even bigger financial risks in the future.
undefined
Nov 27, 2024 • 36min

Episode 116: Painfully Persistent Problems - Weak Passwords

In this episode, we’re diving into one of the most enduring cybersecurity challenges—weak passwords. We’ll explore how poor password practices and identity management pitfalls leave organizations vulnerable to compromise. From understanding the most common mistakes to implementing effective defenses, we’re breaking down what it takes to fortify your systems against attackers exploiting the weakest link. Sourceshttps://www.verizon.com/about/news/2023-data-breach-investigations-report?utm_source=chatgpt.comhttps://blog.1password.com/challenges-of-shadow-it/https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024?msockid=2e875ee0e1fe64d22f854aa6e0746523Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com
undefined
Nov 20, 2024 • 40min

Episode 115: How to understand and address risk w/ Robert McElroy

In this engaging discussion, Robert McElroy, VP at SecureIT 360 with over a dozen years in security governance, shares insights on understanding and managing organizational risk. He dives into the distinction between risk and incident management, emphasizing the need for contextual assessments in cybersecurity. McElroy explores the importance of identifying critical systems, ongoing evaluations, and the role of senior management in prioritizing risks. He also highlights the intricacies of risk management in M365 environments and the value of KPIs in measuring effectiveness.
undefined
Nov 13, 2024 • 38min

Episode 114: Making Penetration Test Results Actionable

Discover the struggles of translating penetration test results into actionable security improvements. Explore the complexities organizations face with distributed responsibilities and limited resources. Learn about the vital role of management in cybersecurity and the importance of training internal IT staff. Delve into the necessity of prioritizing timely remediation of vulnerabilities to foster a proactive security culture. Unpack the paradox of viewing penetration tests as mere checkboxes and instead embrace them as essential security measures.
undefined
Nov 6, 2024 • 28min

Episode 113: Phishing with Malicious RDP Files

A sophisticated Russian cyber group has ramped up spear-phishing efforts by exploiting malicious RDP files. This new tactic targets government and IT sectors, indicating a troubling evolution in their methods. The discussion covers vulnerabilities of Remote Desktop Protocol and highlights the potential risk of harmful file types in emails. Essential security practices are emphasized to guard against these threats, while the importance of user education and adhering to CIS benchmarks is underscored to bolster defenses.
undefined
Oct 30, 2024 • 39min

Episode 112: Key Insights From The Microsoft Digital Defense Report 2024

Explore the latest trends in global cybersecurity as highlighted in the Microsoft Digital Defense Report 2024. Discover how threat actors are targeting the education and research sectors and the rising complexities of ransomware incidents involving universities. Learn about the critical need for stronger identity protection measures and the challenges posed by technical debt. The discussion also emphasizes the importance of understanding attack paths and optimizing existing security tools for a robust defense strategy.
undefined
Oct 23, 2024 • 44min

(Replay) How To Actually Protect Credentials

In this episode replay, Spencer and Darrius break down the complexities of credential protection, discussing everything from user education and tools to threat modeling and guardrails. Plus, we delve into the world of protecting credentials within scripts and code. This is a must-listen for all IT admins, CISOs and any other IT/Security professional.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://click.spenceralessi.com/mylinks Work with Us: https://securit360.com

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app