by Arjun Shailly | Aug 6, 2025 | Threat Talks
Splinternet Check: Zero Trust for a Fragmented Web Find Threat Talks on Splinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Zero Trust Step 4B: How to Secure Admin Access Find Threat Talks on Zero Trust Step 4B: How to Secure Admin Access Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers. In part B of our deep dive into step four of Zero Trust...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Mastering Step Four of Zero Trust: Policy Creation Find Threat Talks on Mastering Step Four of Zero Trust: Policy Creation Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Blockchain in a Post-Quantum World Find Threat Talks on Blockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is...
by Arjun Shailly | Jul 2, 2025 | Deep Dive
Windows Recall: Convenience or Catastrophe? Find Threat Talks on Windows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database. That’s what Windows Recall is designed to do,...