From Revolution to Reality

From Revolution to Reality

From Revolution to Reality Find Threat Talks on Zero Trust: From Revolution to Reality Zero Trust has been around for more than a decade. What started as a networking concept at Forrester evolved into a broader strategy that now shapes federal mandates, enterprise...
China inside your infrastructure

China inside your infrastructure

China inside your infrastructure Find Threat Talks on China is already inside your infrastructure.And the EU is done ignoring it. The European Commission has recently announced a new cybersecurity package in response to what it calls the “daily cyber and hybrid...
Defending a Digital City

Defending a Digital City

Defending a Digital City Find Threat Talks on The Battle of Defending a Digital City Running an airport leaves no room for error.Any casualty is one too much. An airport isn’t just terminals and runways.It’s a city. Police. Fire services. Operations. OT systems. IT...
Beyond NIS2 Compliance

Beyond NIS2 Compliance

Beyond NIS2 Compliance Find Threat Talks on Beyond NIS2 Compliance Cyber resilience is supposed to protect organizations from disruption. Instead, it’s often reduced to policies, controls, and NIS2-driven compliance checklists. Documented. Audited. Approved. As...
Before the Mayday: Cyber Attacks at Sea

Before the Mayday: Cyber Attacks at Sea

Before the Mayday: Cyber Attacks at Sea Find Threat Talks on Before the Mayday: Cyber Attacks at Sea Cyber attacks don’t stop at data centers.They now target ships, navigation systems, and global trade routes. From GPS spoofing to insider threats, the maritime...
From Hacker to Hero

From Hacker to Hero

From Hacker to Hero Find Threat Talks on From Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work – as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI...