Threat Talks
Recent Episodes
Data Bouncing: How HTTP Headers Leak Data
Find Threat Talks onData Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat Talks Deep Dive, our host sits down with Luca Cipriano—CTI and Red Team Program Lead—to...
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
Find Threat Talks onAI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and personal life. In this episode of Threat Talks, Lieuwe...
Zero Trust Step 5A: Monitor and Maintain
Find Threat Talks onZero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right foundation, all those logs, alerts and SIEM dashboards won’t actually keep you secure. In...
Russia’s Seashell Blizzard: Stealth Attacks to Wipers
Find Threat Talks onRussia’s Seashell Blizzard: Stealth Attacks to Wipers They’ve been called Sandworm, APT 44, Iron Viking, and Electrum. But whatever the name, Seashell Blizzard is one of the most disruptive threat actors active today. In this episode of Threat...
SignalGate: Wrong Contact, Classified Chat Leak
Find Threat Talks onSignalGate: Wrong Contact, Classified Chat Leak When a group of U.S. government and military officials chose Signal to share classified information, they assumed it was a secure choice. But one contact mistake was all it took to trigger a major...
Splinternet Check: Zero Trust for a Fragmented Web
Find Threat Talks onSplinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules, values, and controls are...
Cybersecurity Infographics
JOIN THE CYBERSECURITY CONVERSATION
Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.