Threat Talks

Recent Episodes

Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe?

Find Threat Talks onWindows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database. That’s what Windows Recall is designed to do, and while Microsoft claims it all happens...

Agentic AI: Hype, Hope, or Real Risk?

Agentic AI: Hype, Hope, or Real Risk?

Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...

Zero Trust Step Three: Build a Zero Trust Architecture

Zero Trust Step Three: Build a Zero Trust Architecture

Find Threat Talks onZero Trust Step 3: From Ideas to Implementation Build a Zero Trust Architecture Now that you’ve defined your protect surfaces and mapped your transaction flows, it’s time to get hands-on. Step three of Zero Trust is all about building the...

Cybersecurity Without Borders

Cybersecurity Without Borders

Find Threat Talks onCybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fragmented markets,...

Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters?

Find Threat Talks onRed Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or not they hack (or pentest) – but whether they can think like a human hacker. In this...

Rethinking OT: It’s All Just Technology

Rethinking OT: It’s All Just Technology

Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix