
In Episode 176 of the Cyber Threat Perspective podcast, Brad and Spencer break down some of the most repeated cybersecurity best practices in the industry and explain why, despite sounding solid on paper, they consistently fall short in real IT environments. This isn't about dismissing good security principles. It's about closing the gap between advice that looks great in a framework and controls that actually hold up against how attackers operate. Topics covered include: "Just enable MFA eve...
Podzilla Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.

Episode 181: AI Zero Days (Google Threat Intelligence Report)

Episode 180: Cybersecurity Echo Chambers — How to Think Critically in a Hype-Driven Industry

Episode 179: OWASP Top 10 Part 1 - Broken Access Control, IDOR, and CORS Explained

Episode 178: Internal Security Controls That Actually Frustrate Attackers
Free AI-powered recaps of The Cyber Threat Perspective and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.