Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...
All content for Red Team Radio is the property of Red Team Radio and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...
Join us on this engaging episode of Red Team Radio as we sit down with Joe, Principal at Bishop and the mastermind behind the Sliver C2 Framework. Discover the humorous origins of Sliver and explore its key advantages over other command and control frameworks. Host Drew Porter delves deep with Joe into the unique challenges of consulting for clients on the cutting edge. Learn why Joe thrives in the fast-paced, high-stress environment of this dynamic field. Don't miss their insig...
Red Team Radio
Welcome back to Red Team Radio! In this highly anticipated Part 2, host Drew Porter sits down with Valerie, a professional red teamer, to delve deeper into the world of red teaming. In this episode, Drew and Valerie share their favorite types of red team operations, discussing the strategies and methodologies that make each type unique and effective. They also tackle the pressing issue of government intervention in cybersecurity, examining the challenges and implications of havi...