Threat Talks

Recent Episodes

Operational Technology for Dummies

Operational Technology for Dummies

Listen this Threat Talk onOperational Security 101 Buzzwords, Boilers and Breaches From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide...

OT’s Hidden Cyber Risks

OT’s Hidden Cyber Risks

Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...

Zero Trust Starts Here: Define Your Protect Surface

Zero Trust Starts Here: Define Your Protect Surface

Find Threat Talks onZero Trust Deep Dive: Step One Done Right Define your protect surface Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. In step one of Zero Trust: define your protect...

Zero Trust Demystified: What is Zero Trust Really About?

Zero Trust Demystified: What is Zero Trust Really About?

Find Threat Talks onZero Trust Demystified What is Zero Trust Really About? Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? In this kick-off episode of our...

Inside Volt Typhoon: China’s Silent Cyber Threat

Inside Volt Typhoon: China’s Silent Cyber Threat

Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little more than patience and native tools. In this...

Cybercrime-as-a-Service: The Disney+ of the Dark Web

Cybercrime-as-a-Service: The Disney+ of the Dark Web

Listen this Threat Talk onDark Markets: The Disney+ of Cybercrime Exploring Dark Markets with Michele Campobasso   Cybercriminals can now ‘subscribe’ to hacking tools, stolen data, and illicit services just like signing up for Disney+. Instead of movies, they get...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix