Threat Talks
LISTEN TO THE MOST RECENT THREAT TALKS EPISODES:
Deep Dive – MOVEit: The danger of delegating data to third-party software
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITMOVEit: The danger of delegating data to third-party software Supply chain: Data delegation We...
Deep Dive – Log4j: The danger of software dependencies
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITLog4j: The danger of software dependencies Supply chain: Library Dependency In this gripping...
Deep Dive – SolarWinds: The danger of third-party software
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITSolarWinds: The danger of third-party software Dive into the details of the SolarWinds supply...
Supply Chain: Business as usual?
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITMatthijs Zwart CIO and CISO Vitens Supply chain: Business as usual? As reliance on third-party and open-source software grows,...
Deep Dive – Ivanti EPM
Listen to The Threat Talks on:Your PresentorsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITIvanti EPM - SQL injection attack The discovery of a critical SQL injection vulnerability in Ivanti Endpoint...
Deep Dive – Google OAuth bypass
Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITGoogle OAuth Bypass A vulnerability in Google's OAuth system has revealed a loophole in the...
Cybersecurity Infographics
LISTEN TO THE MOST RECENT THREAT TALKS EPISODES:
JOIN THE CYBERSECURITY CONVERSATION
Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.