Threat Talks

Recent Episodes

The OT Attack Cyber Kill Chain

The OT Attack Cyber Kill Chain

Listen this Threat Talk onThe OT attack cyber kill chain Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob...

Operational Technology for Dummies

Operational Technology for Dummies

Listen this Threat Talk onOperational Security 101 Buzzwords, Boilers and Breaches From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide...

OT’s Hidden Cyber Risks

OT’s Hidden Cyber Risks

Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...

Zero Trust Starts Here: Define Your Protect Surface

Zero Trust Starts Here: Define Your Protect Surface

Find Threat Talks onZero Trust Deep Dive: Step One Done Right Define your protect surface Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business. In step one of Zero Trust: define your protect...

Zero Trust Demystified: What is Zero Trust Really About?

Zero Trust Demystified: What is Zero Trust Really About?

Find Threat Talks onZero Trust Demystified What is Zero Trust Really About? Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing? In this kick-off episode of our...

Inside Volt Typhoon: China’s Silent Cyber Threat

Inside Volt Typhoon: China’s Silent Cyber Threat

Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little more than patience and native tools. In this...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix