by Arjun Shailly | Jun 17, 2025 | Deep Dive
Cybersecurity Without Borders Find Threat Talks on Cybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing...
by Arjun Shailly | Jun 6, 2025 | Deep Dive
Will AI Replace Human Pentesters? Find Threat Talks on Red Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or not they hack (or pentest) – but whether they can think...
by Arjun Shailly | Jun 2, 2025 | Threat Talks
Rethinking OT: It’s All Just Technology Find Threat Talks on Rethinking OT: It’s All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode...
by Arjun Shailly | May 27, 2025 | Deep Dive
Zero Trust Step 2: Map the Transaction Flows Find Threat Talks on Zero Trust Step 2: Map the transaction flows Why You Need to Understand Data Flows Once you have defined a few protect surfaces (see: Step 1 of Zero Trust), the next step is to start mapping the...
by Arjun Shailly | May 20, 2025 | Deep Dive
The OT Attack Cyber kill Chain Listen this Threat Talk on The OT attack cyber kill chain Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT...