Threat Talks

Resilience Over Fragmentation

Resilience Over Fragmentation

Find Threat Talks onResilience Over Fragmentation: The Risk You Can’t Ignore In this Threat Talks episode, Lieuwe Jan Koning sits with Professor Bart Jacobs to show—through simple, real stories—how scattered tools and ad-driven platforms take away control, and how...

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

Find Threat Talks onAI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and personal life. In this episode of Threat Talks, Lieuwe...

Splinternet Check: Zero Trust for a Fragmented Web

Splinternet Check: Zero Trust for a Fragmented Web

Find Threat Talks onSplinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules, values, and controls are...

Agentic AI: Hype, Hope, or Real Risk?

Agentic AI: Hype, Hope, or Real Risk?

Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...

Rethinking OT: It’s All Just Technology

Rethinking OT: It’s All Just Technology

Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...

OT’s Hidden Cyber Risks

OT’s Hidden Cyber Risks

Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...

Inside Volt Typhoon: China’s Silent Cyber Threat

Inside Volt Typhoon: China’s Silent Cyber Threat

Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little more than patience and native tools. In this...

Inside the Dark Web Economy

Inside the Dark Web Economy

Listen this Threat Talk onUnmasking the Dark Web How hackers monetize your data   Stolen credentials, hacked corporate systems, even illegal services: it’s all for sale, sometimes for as little as $10. In this episode of Threat Talks, host Lieuwe Jan Koning is...

Why SSL Decryption Matters

Why SSL Decryption Matters

Listen this Threat Talk onDecrypting Cyber Threats The top three tips for implementing decryption   With over 95% of web traffic now encrypted and 70% of cyberattacks leveraging encryption to evade detection, organizations that fail to decrypt their traffic are...

Precision Time Protocol

Precision Time Protocol

Listen this Threat Talk onPrecision Time Protocol Why time synchronization matters more than you think   Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field CTO at ON2IT) is joined by...

Reboot of Strategy – Back to first principles with Rick Howard

Reboot of Strategy – Back to first principles with Rick Howard

Listen this Threat Talk onReboot of Strategy Back to first principles with Rick Howard I think, therefore I am, is René Descartes’ first principle. But how does that relate to cybersecurity? In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Rick...

The Rising Threat of Deepfakes

The Rising Threat of Deepfakes

Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake...

Deep Dives

Zero Trust Step 5B: Maintain Controls

Zero Trust Step 5B: Maintain Controls

Find Threat Talks onZero Trust Step 5B: Maintaining Security Controls Breaches aren’t shocks; they’re late-stage symptoms of control decay. Drift turns “temporary” access into...

Promptlock – The First AI-Powered Malware

Promptlock – The First AI-Powered Malware

Find Threat Talks onPromptlock - The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a...

Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data

Find Threat Talks onData Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat...

Zero Trust Step 5A: Monitor and Maintain

Zero Trust Step 5A: Monitor and Maintain

Find Threat Talks onZero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right...

Blockchain in a Post-Quantum World

Blockchain in a Post-Quantum World

Find Threat Talks onBlockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this...

Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe?

Find Threat Talks onWindows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database....