Send us Fan Mail A single compromised identity can turn your whole environment into a hallway of unlocked doors and cross-domain attacks are built to exploit exactly that. We start with a timely real-world breach theme and use it to explain how adversaries move between endpoints, cloud platforms, and third-party connections by abusing identity and privileged access, not just by running noisy malware. If your organization relies on a patchwork of identity tools, limited visibility, and “normal...
AI Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.
CCT 344: Trigona RaaS - CISSP 3.7 Crypto - Board Translation Framework (Segment 3)
CCT 343: Microsoft Defender - CISSP EOL-EOS (Part 2) - Board Translation (Segment 2)
CCT 342: US Govt and Mythos - CISSP EOL-EOS (Part 1) - Board Translation (Segment 1)
CCT 341: Deepfake Nudify (Wired) - CISSP Exam Practice Test (Deep Dive)
Free AI-powered recaps of CISSP Cyber Training Podcast - CISSP Training Program and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.