Threat Talks

Recent Episodes

Zero Trust Step 4B: How to Secure Admin Access

Zero Trust Step 4B: How to Secure Admin Access

Find Threat Talks onZero Trust Step 4B: How to Secure Admin Access Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers. In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan...

Mastering Step Four of Zero Trust: Policy Creation

Mastering Step Four of Zero Trust: Policy Creation

Find Threat Talks onMastering Step Four of Zero Trust: Policy Creation Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s...

Blockchain in a Post-Quantum World

Blockchain in a Post-Quantum World

Find Threat Talks onBlockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads...

Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe?

Find Threat Talks onWindows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database. That’s what Windows Recall is designed to do, and while Microsoft claims it all happens...

Agentic AI: Hype, Hope, or Real Risk?

Agentic AI: Hype, Hope, or Real Risk?

Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...

Zero Trust Step Three: Build a Zero Trust Architecture

Zero Trust Step Three: Build a Zero Trust Architecture

Find Threat Talks onZero Trust Step 3: From Ideas to Implementation Build a Zero Trust Architecture Now that you’ve defined your protect surfaces and mapped your transaction flows, it’s time to get hands-on. Step three of Zero Trust is all about building the...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix