Threat Talks
Recent Episodes
From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard
Find Threat Talks onFrom Stealth to Wipers: How Seashell Blizzard Operates They’ve been called Sandworm, APT 44, Iron Viking, and Electrum. But whatever the name, Seashell Blizzard is one of the most disruptive threat actors active today. In this episode of Threat...
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak
Find Threat Talks onSignal Gate Exposed: Shadow IT’s Role in 2025’s Biggest Leak When a group of U.S. government and military officials chose Signal to share classified information, they assumed it was a secure choice. But one contact mistake was all it took to...
Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web
Find Threat Talks onSplinternet Reality Check: Zero Trust Strategies for a Fragmenting Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules,...
Zero Trust Step 4B: How to Secure Admin Access
Find Threat Talks onZero Trust Step 4B: How to Secure Admin Access Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers. In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan...
Mastering Step Four of Zero Trust: Policy Creation
Find Threat Talks onMastering Step Four of Zero Trust: Policy Creation Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s...
Blockchain in a Post-Quantum World
Find Threat Talks onBlockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder, who leads...
Cybersecurity Infographics
JOIN THE CYBERSECURITY CONVERSATION
Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.