by KarinMuller | Mar 27, 2025 | Threat Talks
Why SSL Decryption Matters Listen this Threat Talk on Decrypting Cyber Threats The top three tips for implementing decryption With over 95% of web traffic now encrypted and 70% of cyberattacks leveraging encryption to evade detection, organizations that fail to...
by KarinMuller | Mar 25, 2025 | Threat Talks
Precision Time Protocol Listen this Threat Talk on Precision Time Protocol Why time synchronization matters more than you think Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field...
by KarinMuller | Mar 11, 2025 | Deep Dive
Intrusion Kill Chain with Rick Howard Listen this Threat Talk on Intrusion Kill Chain with Rick Howard Turning the Tables on Attackers In this episode, host Lieuwe Jan Koning is once again joined by Rick Howard, former Commander of the US Army’s Computer...
by KarinMuller | Feb 18, 2025 | Deep Dive
Post-Quantum Threat to Encryption: Are You Ready? Listen this Threat Talk on Post-Quantum Threat to Encryption 🚀 The Quantum Age Is Near: Are You Ready? 🔒 Quantum computing is no longer a distant dream. With Q-Day expected within 5-15 years, it’s time to rethink...
by KarinMuller | Feb 11, 2025 | Deep Dive
Breaking the Defenses: EDR Bypass Listen this Threat Talk on Breaking the Defenses: EDR Bypass 🎯 Are Your Endpoint Protection Solutions Truly Secure? In this episode of Threat Talks – The Deep Dive, Rob Maas sits down with ON2IT’s Cyber Threat Specialist, Luca...