Artwork

Contenido proporcionado por Pentest-Tools.com. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Pentest-Tools.com o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

We think we know offensive security is an infinite game (and why)

54:48
 
Compartir
 

Manage episode 419066866 series 3575078
Contenido proporcionado por Pentest-Tools.com. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Pentest-Tools.com o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

“There is no end goal in this industry. You're always going to keep moving forward.”

This quote from our guest does a great job at capturing the conversation we explore in this podcast: the love for the process, the hunger for knowledge, how to add value for clients, and become a better penetration tester.

For the third episode of We think we know, we welcome Tim Connell, an enthusiastic penetration tester and the Director of Cybersecurity Services at Pulsar Security, to explore the most common security testing myths and misconceptions.

Tim shares some practical tips and examples that spotlight his commitment to continuous learning and community contribution. His enthusiasm and genuine dedication to this space are so inspiring - that we hope will lift you and get better at what you do.

So join us on We think we know, as we unpack the layers and narratives shaping offensive security work.

Listen to the new episode to find out:

  • Why it’s essential to really understand what each customer needs from their pentest [08:31]
  • How to improve your workflow by making some of it replicable [21:33]
  • Why it matters to learn as much as you can and use that to deliver better work [33:05]
  • How to speed up your learning process by building stuff and looking deeper into vulnerabilities [41:21]
  • Why (and how) visual representations boost clear communication in penetrating testing [46:31]
  • The perks of being more involved in the community, being resourceful, and keeping your motivation to move forward [50:05]

At the end of it, you’ll walk away with many valuable lessons to use in both your life and career. Let us know which hit home for you!

Resources from this episode:

  continue reading

13 episodios

Artwork
iconCompartir
 
Manage episode 419066866 series 3575078
Contenido proporcionado por Pentest-Tools.com. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Pentest-Tools.com o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

“There is no end goal in this industry. You're always going to keep moving forward.”

This quote from our guest does a great job at capturing the conversation we explore in this podcast: the love for the process, the hunger for knowledge, how to add value for clients, and become a better penetration tester.

For the third episode of We think we know, we welcome Tim Connell, an enthusiastic penetration tester and the Director of Cybersecurity Services at Pulsar Security, to explore the most common security testing myths and misconceptions.

Tim shares some practical tips and examples that spotlight his commitment to continuous learning and community contribution. His enthusiasm and genuine dedication to this space are so inspiring - that we hope will lift you and get better at what you do.

So join us on We think we know, as we unpack the layers and narratives shaping offensive security work.

Listen to the new episode to find out:

  • Why it’s essential to really understand what each customer needs from their pentest [08:31]
  • How to improve your workflow by making some of it replicable [21:33]
  • Why it matters to learn as much as you can and use that to deliver better work [33:05]
  • How to speed up your learning process by building stuff and looking deeper into vulnerabilities [41:21]
  • Why (and how) visual representations boost clear communication in penetrating testing [46:31]
  • The perks of being more involved in the community, being resourceful, and keeping your motivation to move forward [50:05]

At the end of it, you’ll walk away with many valuable lessons to use in both your life and career. Let us know which hit home for you!

Resources from this episode:

  continue reading

13 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida