
Sign up to save your podcasts
Or
Enjoying the content? Let us know your feedback!
In this episode, we’ll look into a cybersecurity assessment method that mimics real-world attacks to test an organization's security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the game. Threat emulation aims to identify and mitigate security gaps before attackers exploit them, providing a more comprehensive evaluation than traditional assessments.
Before we dive into the main topic, lets glance what is happening on the security front:
- https://msrc.microsoft.com: March 2025 Security Updates
- https://detect-respond.blogspot.com: Pyramid Of Pain
- https://www.atomicredteam.io: Atomic Read Team
- https://www.ecb.europa.eu/paym/cyber-resilience/tiber-eu/html/index.en.html
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
Enjoying the content? Let us know your feedback!
In this episode, we’ll look into a cybersecurity assessment method that mimics real-world attacks to test an organization's security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the game. Threat emulation aims to identify and mitigate security gaps before attackers exploit them, providing a more comprehensive evaluation than traditional assessments.
Before we dive into the main topic, lets glance what is happening on the security front:
- https://msrc.microsoft.com: March 2025 Security Updates
- https://detect-respond.blogspot.com: Pyramid Of Pain
- https://www.atomicredteam.io: Atomic Read Team
- https://www.ecb.europa.eu/paym/cyber-resilience/tiber-eu/html/index.en.html
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
111,250 Listeners