Threat Talks
Most Recent Episodes
Deep Dive – OKTA Data Breach
OKTA Data Breach Even security providers aren’t immune How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google...
Deep Dive – Accellion File Transfer Appliance
Find Threat Talks onAccellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely trusted, certified and compliant with all the necessary regulations – so you’ve done...
Bridging the Gap: Security and Compliance
Find Threat Talks onBridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many organizations focus on meeting compliance standards,...
Deep Dive – APT Sand Eagle
Explore Sand Eagle, a cyber espionage operation targeting iPhones of Russian officials, highlighting the challenges and limitations of current security measures against advanced threats.
Deep Dive – Russia GRU Viasat Hack
Find Threat Talks onRussia GRU Viasat Hack Ethan Hunt is known for doing the impossible. Mostly by blowing things up with his team. What if he and his team spoke Russian and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in...
Deep Dive – China Barracuda Nexus Hack
Find Threat Talks onChina Nexus Barracuda Hack 🚨 In today’s world, cyber threats are as real and sophisticated as a James Bond movie. Do we stand a chance defending ourselves against modern day cyber espionage? In episode #30 of Threat Talks, host and CTO Lieuwe Jan...
Cybersecurity Infographics
LISTEN TO THE MOST RECENT THREAT TALKS EPISODES:
JOIN THE CYBERSECURITY CONVERSATION
Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.