Threat Talks

Most Recent Episodes

Deep Dive – OKTA Data Breach

Deep Dive – OKTA Data Breach

OKTA Data Breach Even security providers aren’t immune How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertently saved by an OKTA employee to their personal Google...

Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance

Find Threat Talks onAccellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely trusted, certified and compliant with all the necessary regulations – so you’ve done...

Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance

Find Threat Talks onBridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many organizations focus on meeting compliance standards,...

Deep Dive – APT Sand Eagle

Deep Dive – APT Sand Eagle

Explore Sand Eagle, a cyber espionage operation targeting iPhones of Russian officials, highlighting the challenges and limitations of current security measures against advanced threats.

Deep Dive – Russia GRU Viasat Hack

Deep Dive – Russia GRU Viasat Hack

Find Threat Talks onRussia GRU Viasat Hack Ethan Hunt is known for doing the impossible. Mostly by blowing things up with his team. What if he and his team spoke Russian and on the onset of the invasion of Ukraine, they brought down control of 5.800 wind turbines in...

Deep Dive – China Barracuda Nexus Hack

Deep Dive – China Barracuda Nexus Hack

Find Threat Talks onChina Nexus Barracuda Hack 🚨 In today’s world, cyber threats are as real and sophisticated as a James Bond movie. Do we stand a chance defending ourselves against modern day cyber espionage? In episode #30 of Threat Talks, host and CTO Lieuwe Jan...

Cybersecurity Infographics

The evolution of cyber warfare infographic
Remote work Infographic

LISTEN TO THE MOST RECENT THREAT TALKS EPISODES:

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

presented by

on2it and aMS-ix