Artwork

Treść dostarczona przez Pentest-Tools.com. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Pentest-Tools.com lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

We think we know offensive security is an infinite game (and why)

54:48
 
Udostępnij
 

Manage episode 419066866 series 3575078
Treść dostarczona przez Pentest-Tools.com. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Pentest-Tools.com lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

“There is no end goal in this industry. You're always going to keep moving forward.”

This quote from our guest does a great job at capturing the conversation we explore in this podcast: the love for the process, the hunger for knowledge, how to add value for clients, and become a better penetration tester.

For the third episode of We think we know, we welcome Tim Connell, an enthusiastic penetration tester and the Director of Cybersecurity Services at Pulsar Security, to explore the most common security testing myths and misconceptions.

Tim shares some practical tips and examples that spotlight his commitment to continuous learning and community contribution. His enthusiasm and genuine dedication to this space are so inspiring - that we hope will lift you and get better at what you do.

So join us on We think we know, as we unpack the layers and narratives shaping offensive security work.

Listen to the new episode to find out:

  • Why it’s essential to really understand what each customer needs from their pentest [08:31]
  • How to improve your workflow by making some of it replicable [21:33]
  • Why it matters to learn as much as you can and use that to deliver better work [33:05]
  • How to speed up your learning process by building stuff and looking deeper into vulnerabilities [41:21]
  • Why (and how) visual representations boost clear communication in penetrating testing [46:31]
  • The perks of being more involved in the community, being resourceful, and keeping your motivation to move forward [50:05]

At the end of it, you’ll walk away with many valuable lessons to use in both your life and career. Let us know which hit home for you!

Resources from this episode:

  continue reading

13 odcinków

Artwork
iconUdostępnij
 
Manage episode 419066866 series 3575078
Treść dostarczona przez Pentest-Tools.com. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Pentest-Tools.com lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

“There is no end goal in this industry. You're always going to keep moving forward.”

This quote from our guest does a great job at capturing the conversation we explore in this podcast: the love for the process, the hunger for knowledge, how to add value for clients, and become a better penetration tester.

For the third episode of We think we know, we welcome Tim Connell, an enthusiastic penetration tester and the Director of Cybersecurity Services at Pulsar Security, to explore the most common security testing myths and misconceptions.

Tim shares some practical tips and examples that spotlight his commitment to continuous learning and community contribution. His enthusiasm and genuine dedication to this space are so inspiring - that we hope will lift you and get better at what you do.

So join us on We think we know, as we unpack the layers and narratives shaping offensive security work.

Listen to the new episode to find out:

  • Why it’s essential to really understand what each customer needs from their pentest [08:31]
  • How to improve your workflow by making some of it replicable [21:33]
  • Why it matters to learn as much as you can and use that to deliver better work [33:05]
  • How to speed up your learning process by building stuff and looking deeper into vulnerabilities [41:21]
  • Why (and how) visual representations boost clear communication in penetrating testing [46:31]
  • The perks of being more involved in the community, being resourceful, and keeping your motivation to move forward [50:05]

At the end of it, you’ll walk away with many valuable lessons to use in both your life and career. Let us know which hit home for you!

Resources from this episode:

  continue reading

13 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi