Threat Talks
Recent Episodes
Defending a Digital City
How do you secure an airport like a digital city? Learn how DFW Airport’s CISO defends IT, OT, and critical infrastructure in a 24/7 environment.
From IPs to People
Find Threat Talks onFrom IPs to PeopleDetection only works when activity is tied to identity. Most networks still enforce access and investigate incidents using IP addresses. But IPs don’t explain intent.They don’t travel with the user.And they don’t tell you who...
Beyond NIS2 Compliance
Find Threat Talks onBeyond NIS2 Compliance Cyber resilience is supposed to protect organizations from disruption. Instead, it’s often reduced to policies, controls, and NIS2-driven compliance checklists. Documented. Audited. Approved. As digital systems become central...
Maritime Cybersecurity: Predictable = Hackable
Find Threat Talks onMaritime Cybersecurity: Predictable = Hackable Autonomous shipping is supposed to make the ocean safer by removing human error. Instead, predictability is turning vessels into steerable systems, vulnerable by design. Remote. Unmanned. Predictable....
Before the Mayday: Cyber Attacks at Sea
Find Threat Talks onBefore the Mayday: Cyber Attacks at Sea Cyber attacks don’t stop at data centers.They now target ships, navigation systems, and global trade routes. From GPS spoofing to insider threats, the maritime industry is quietly becoming one of the most...
Looking Back at 2025
Find Threat Talks onLooking Back at 2025: Cybersecurity at a Turning Point Detection didn’t fail in 2025.It reached its limits - and many teams only realized it after the fact. The threat landscape didn’t suddenly become more sophisticated-it became faster, more...
Cybersecurity Infographics
JOIN THE CYBERSECURITY CONVERSATION
Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.












