Today we are talking about how long threat actors actually spend inside a target building and why simulating the wrong threat for your client may be security theater.
Playback speed
×
Share post
Share post at current time
Share from 0:00
0:00
/
Transcript
Covert Access Team Podcast
Covert Access Team Podcast is your inside look into the world of covert entry, physical pentesting, and security auditing. We dive deep into the art of bypassing physical security systems, real world stories, espionage, and high-stakes hacking. Each episode covers topics such as: techniques used by professional black teams, insights into vulnerabilities in modern security, lessons learned from covert operations and even the business side of physical security.
Whether you're a security pro, curious about espionage, or just fascinated by the unseen layers of protection around us, the Covert Access Team brings you the knowledge to understand and defend against the threats lurking in the shadows. Tune in to learn how breaches happen – and how to prevent them.
Covert Access Team Podcast is your inside look into the world of covert entry, physical pentesting, and security auditing. We dive deep into the art of bypassing physical security systems, real world stories, espionage, and high-stakes hacking. Each episode covers topics such as: techniques used by professional black teams, insights into vulnerabilities in modern security, lessons learned from covert operations and even the business side of physical security.
Whether you're a security pro, curious about espionage, or just fascinated by the unseen layers of protection around us, the Covert Access Team brings you the knowledge to understand and defend against the threats lurking in the shadows. Tune in to learn how breaches happen – and how to prevent them.Listen on
Substack App
Spotify
YouTube
RSS Feed
Appears in episode
Recent Episodes









