Threat Talks

Recent Episodes

Cybersecurity Without Borders

Cybersecurity Without Borders

Find Threat Talks onCybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets,...

Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters?

Find Threat Talks onRed Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or not they hack (or pentest) – but whether they can think like a human hacker. In this...

Rethinking OT: It’s All Just Technology

Rethinking OT: It’s All Just Technology

Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...

Zero Trust Step 2: Map the Transaction Flows

Zero Trust Step 2: Map the Transaction Flows

Find Threat Talks onZero Trust Step 2: Map the transaction flows Why You Need to Understand Data Flows Once you have defined a few protect surfaces (see: Step 1 of Zero Trust), the next step is to start mapping the transaction flows: how these protect surfaces...

The OT Attack Cyber kill Chain

The OT Attack Cyber kill Chain

Listen this Threat Talk onThe OT attack cyber kill chain Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob...

Operational Technology for Dummies

Operational Technology for Dummies

Listen this Threat Talk onOperational Security 101 Buzzwords, Boilers and Breaches From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix