Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...
All content for Red Team Radio is the property of Red Team Radio and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...
Welcome to Red Team Radio! In today’s episode, host Drew Porter is joined by cybersecurity expert Valerie Thomas for an enlightening discussion on Red Teaming in both the public and private sectors. Valerie sheds light on the strategic advantages of leveraging stereotypes in social engineering and what has worked well for her. From her experiences from 15 years ago to the challenges faced today, Valerie provides a comprehensive look at how the landscape has transformed. Plus, do...
Red Team Radio
Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...