Threat Talks

Recent Episodes

Hack the Boat

Hack the Boat

Explore cyber threats in the maritime industry with Threat Talks. Dive into how modern ships face hacking risks and learn about cutting-edge cybersecurity solutions at Damen Shipyards.

Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack

The HTTP/2 Rapid Reset attack, a powerful DDoS method, exploits vulnerabilities in the HTTP/2 protocol to overwhelm servers. Experts dive into how attackers use this and ways to mitigate it.

Deep Dive – Capital One Data Breach

Deep Dive – Capital One Data Breach

Explore how a misconfigured web app firewall led to the Capital One data breach, exposing 100M+ credit apps. Learn key lessons with experts in this in-depth Threat Talks episode.

Deep Dive – OKTA Data Breach

Deep Dive – OKTA Data Breach

OKTA Data Breach Even security providers aren’t immune How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google...

Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance

Find Threat Talks onAccellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely trusted, certified and compliant with all the necessary regulations – so you’ve done...

Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance

Find Threat Talks onBridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many organizations focus on meeting compliance standards,...

Cybersecurity Infographics

The evolution of cyber warfare infographic
Remote work Infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix