Threat Talks

Recent Episodes

Inside the SalesLoft Breach

Inside the SalesLoft Breach

Find Threat Talks onInside the SalesLoft Breach SaaS was sold as safe — Inside the Salesloft Breach shows why it wasn’t.Hosts Rob Maas and Luca Cipriano expose how long-lived OAuth tokens and trusted integrations turned Salesforce, Salesloft, and Drift into silent...

The App Store Nightmare: The AI MCP Stores Trap

The App Store Nightmare: The AI MCP Stores Trap

Find Threat Talks onThe App Store Nightmare: Why AI MCP Stores Are a Trap The app store nightmare is here - and you’re already in it. AI “helpers” (agents) powered by MCP (a system that lets AI use other tools) can act on your behalf without you seeing it. Host Lieuwe...

The Secret Diplomats Fighting Cyber Wars

The Secret Diplomats Fighting Cyber Wars

Find Threat Talks onThe Secret Diplomats Fighting Cyber Wars Every cyberattack headline hides a story of negotiation and restraint. In this episode of Threat Talks, Lieuwe Jan Koning talks with Ernst Noorman, Ambassador at Large for Cyber Affairs of the Kingdom of the...

Patch Smarter, Not Harder

Patch Smarter, Not Harder

Find Threat Talks onPatch Smarter, Not Harder Alarm bell: “Patch Smarter, Not Harder”. Hosts Lieuwe Jan Koning and Rob Maas show why patch management without Zero Trust is a risk amplifier in modern cybersecurity. They reveal a playbook that prioritizes edge devices,...

Public Key Infrastructure: Digital Trust Foundation

Public Key Infrastructure: Digital Trust Foundation

Find Threat Talks onPublic Key Infrastructure: The Foundation of Digital Trust PKI isn’t paperwork.It’s the switch that turns digital trust on—or off.Set it up right and you get clean SSL decryption, hardened admin access, and identities that hold.Mess it up and you...

Why Your Cyber Hygiene Matters?

Why Your Cyber Hygiene Matters?

Find Threat Talks onWhy Your Cyber Hygiene Matters? What happens when one person’s bad cyber hygiene puts an entire network at risk?The result can be devastating—unauthorized access, data theft, and a ripple effect that endangers not just one user, but every connected...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix