Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...
All content for Red Team Radio is the property of Red Team Radio and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...
In the second installment of this riveting two-part interview, Red Team Radio explores the realm of espionage with Mr. Anderson, an experienced specialist in Human Intelligence (HUMINT) and Covert Entry techniques. Mr. Anderson shares insights from various operations he participated in and discusses the role of Social Engineering in clandestine infiltration. Additionally, our host recounts an experience where he had to adeptly navigate a project amidst numerous challenges.
Red Team Radio
Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...