by Arjun Shailly | Jul 2, 2025 | Deep Dive
Windows Recall: Convenience or Catastrophe? Find Threat Talks on Windows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database. That’s what Windows Recall is designed to do,...
by Arjun Shailly | Jul 1, 2025 | Threat Talks
Agentic AI: Hype, Hope, or Real Risk? Find Threat Talks on Agentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there’s a 5% chance that within...
by Arjun Shailly | Jun 24, 2025 | Deep Dive
Zero Trust Step Three: Build a Zero Trust Architecture Find Threat Talks on Zero Trust Step 3: From Ideas to Implementation Build a Zero Trust Architecture Now that you’ve defined your protect surfaces and mapped your transaction flows, it’s time to get hands-on. Step...
by Arjun Shailly | Jun 17, 2025 | Deep Dive
Cybersecurity Without Borders Find Threat Talks on Cybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing...
by Arjun Shailly | Jun 6, 2025 | Deep Dive
Will AI Replace Human Pentesters? Find Threat Talks on Red Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or not they hack (or pentest) – but whether they can think...