Beyond NIS2 Compliance

Beyond NIS2 Compliance

Beyond NIS2 Compliance Find Threat Talks on Beyond NIS2 Compliance Cyber resilience is supposed to protect organizations from disruption. Instead, it’s often reduced to policies, controls, and NIS2-driven compliance checklists. Documented. Audited. Approved. As...
The Npm Worm Outbreak

The Npm Worm Outbreak

The Npm Worm Outbreak Find Threat Talks on The Npm Worm Outbreak   For the first time, the world’s biggest open-source ecosystem saw a worm that spread on its own.No botnet. No manual upload. Just automation – and trust – turned against developers....
The Secret Diplomats Fighting Cyber Wars

The Secret Diplomats Fighting Cyber Wars

The Secret Diplomats Fighting Cyber Wars Find Threat Talks on The Secret Diplomats Fighting Cyber Wars Every cyberattack headline hides a story of negotiation and restraint. In this episode of Threat Talks, Lieuwe Jan Koning talks with Ernst Noorman, Ambassador at...
Patch Smarter, Not Harder

Patch Smarter, Not Harder

Patch Smarter, Not Harder Find Threat Talks on Patch Smarter, Not Harder Alarm bell: “Patch Smarter, Not Harder”. Hosts Lieuwe Jan Koning and Rob Maas show why patch management without Zero Trust is a risk amplifier in modern cybersecurity. They reveal a playbook that...
The Evolution of Cyber Warfare

The Evolution of Cyber Warfare

The Evolution of Cyber Warfare Find Threat Talks on The Evolution of Cyber Warfare Advanced Threat Intelligence helps you know your enemy. Explore the hidden world of cyber warfare and Advanced Persistent Threats (APT’s) with Threat Intel Specialist Luca...