Blockchain in a Post-Quantum World

Blockchain in a Post-Quantum World

Blockchain in a Post-Quantum World Find Threat Talks on Blockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is...
Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe? Find Threat Talks on Windows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database. That’s what Windows Recall is designed to do,...
Cybersecurity Without Borders

Cybersecurity Without Borders

Cybersecurity Without Borders Find Threat Talks on Cybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing...
Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters? Find Threat Talks on Red Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or not they hack (or pentest) – but whether they can think...
Zero Trust Step 2: Map the Transaction Flows

Zero Trust Step 2: Map the Transaction Flows

Zero Trust Step 2: Map the Transaction Flows Find Threat Talks on Zero Trust Step 2: Map the transaction flows Why You Need to Understand Data Flows Once you have defined a few protect surfaces (see: Step 1 of Zero Trust), the next step is to start mapping the...