by Arjun Shailly | May 12, 2025 | Deep Dive
Operational Technology for Dummies Listen this Threat Talk on Operational Security 101 Buzzwords, Boilers and Breaches From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical...
by Arjun Shailly | May 1, 2025 | Threat Talks
OT’s Hidden Cyber Risks Find Threat Talks on Hack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this...
by Arjun Shailly | Apr 29, 2025 | Deep Dive
Zero Trust Starts Here: Define Your Protect Surface Find Threat Talks on Zero Trust Deep Dive: Step One Done Right Define your protect surface Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business....
by Arjun Shailly | Apr 22, 2025 | Deep Dive
Zero Trust Demystified: What is Zero Trust Really About? Find Threat Talks on Zero Trust Demystified What is Zero Trust Really About? Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy,...
by Arjun Shailly | Apr 15, 2025 | Deep Dive, Threat Talks
Inside Volt Typhoon: China’s Silent Cyber Threat Find Threat Talks on Inside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little...