Beyond NIS2 Compliance

Beyond NIS2 Compliance

Beyond NIS2 Compliance Find Threat Talks on Beyond NIS2 Compliance Cyber resilience is supposed to protect organizations from disruption. Instead, it’s often reduced to policies, controls, and NIS2-driven compliance checklists. Documented. Audited. Approved. As...
Before the Mayday: Cyber Attacks at Sea

Before the Mayday: Cyber Attacks at Sea

Before the Mayday: Cyber Attacks at Sea Find Threat Talks on Before the Mayday: Cyber Attacks at Sea Cyber attacks don’t stop at data centers.They now target ships, navigation systems, and global trade routes. From GPS spoofing to insider threats, the maritime...
From Hacker to Hero

From Hacker to Hero

From Hacker to Hero Find Threat Talks on From Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work – as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI...
Inside the SalesLoft Breach

Inside the SalesLoft Breach

Inside the SalesLoft Breach Find Threat Talks on Inside the SalesLoft Breach SaaS was sold as safe — Inside the Salesloft Breach shows why it wasn’t.Hosts Rob Maas and Luca Cipriano expose how long-lived OAuth tokens and trusted integrations turned Salesforce,...
The Secret Diplomats Fighting Cyber Wars

The Secret Diplomats Fighting Cyber Wars

The Secret Diplomats Fighting Cyber Wars Find Threat Talks on The Secret Diplomats Fighting Cyber Wars Every cyberattack headline hides a story of negotiation and restraint. In this episode of Threat Talks, Lieuwe Jan Koning talks with Ernst Noorman, Ambassador at...
Resilience Over Fragmentation

Resilience Over Fragmentation

Resilience Over Fragmentation Find Threat Talks on Resilience Over Fragmentation: The Risk You Can’t Ignore In this Threat Talks episode, Lieuwe Jan Koning sits with Professor Bart Jacobs to show—through simple, real stories—how scattered tools and ad-driven platforms...