The Authentication Apocalypse

The Authentication Apocalypse

The Authentication Apocalypse Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO, ON2IT Luca Cipriano Threat Intel Specialist, ON2IT Harald Bosman Senior Endpoint Engineer, AMS-IX The Authentication Apocalypse Word of data breaches and stolen credentials...
FortiOS SSLVPN buffer overflow

FortiOS SSLVPN buffer overflow

Listen to The Threat Talks on: FortiOS SSLVPN buffer overflow Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO ON2IT Group Luca Cipriano Threat Intel Specialist ON2IT Rob Maas Field CTO ON2IT FortiOS SSLVPN buffer overflow The FortiOS SSLVPN buffer...
TunnelCrack VPN – Deep Dive

TunnelCrack VPN – Deep Dive

Listen to The Threat Talks on: TunnelCrack VPN – Deep Dive Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO ON2IT Luca Cipriano Threat Intel Specialist ON2IT TunnelCrack VPN vulnerability A deep dive into TunnelCrack, an advanced attack that...
Citrix NetScaler – Deep dive

Citrix NetScaler – Deep dive

Listen to The Threat Talks on: Citrix NetScaler – Deep dive Your cybersecurity experts Lieuwe Jan Koning Co-Founder and CTO ON2IT Luca Cipriano Threat Intel Specialist ON2IT Citrix Netscaler Exploring the critical cybersecurity threat posed by the Citrix...
Does remote work?

Does remote work?

Listen to The Threat Talks on: Does remote work? Your cybersecurity experts Rob Maas Field CTO ON2IT Lieuwe Jan Koning Co-Founder and CTO ON2IT Luca Cipriano Threat Intel Specialist ON2IT Does remote work? Allowing remote access, is required for almost all...