Post-Quantum Threat to Encryption: Are You Ready?

Post-Quantum Threat to Encryption: Are You Ready?

Post-Quantum Threat to Encryption: Are You Ready? Listen this Threat Talk on Post-Quantum Threat to Encryption πŸš€ The Quantum Age Is Near: Are You Ready? πŸ”’ Quantum computing is no longer a distant dream. With Q-Day expected within 5-15 years, it’s time to rethink...
Breaking the Defenses: EDR Bypass

Breaking the Defenses: EDR Bypass

Breaking the Defenses: EDR Bypass Listen this Threat Talk on Breaking the Defenses: EDR Bypass 🎯 Are Your Endpoint Protection Solutions Truly Secure? In this episode of Threat Talks – The Deep Dive, Rob Maas sits down with ON2IT’s Cyber Threat Specialist, Luca...
Inside the Hackers Mind

Inside the Hackers Mind

Inside the Hackers Mind Listen to this episode of Threat Talks on Inside the Hackers Mind πŸ‘Ύ Ever wondered what it’s like to think like a hacker? In this Threat Talks episode, host Lieuwe Jan Koning is joined by ethical hacker Tom van de Wiele, founder of Hackerminded,...
Salt Typhoon: How Nine Telcos Were Compromised

Salt Typhoon: How Nine Telcos Were Compromised

Salt Typhoon: How Nine Telcos Were Compromised Find Threat Talks on Salt Typhoon: How Nine Telcos Were Compromised Exposing the Vulnerabilities and Fallout In this episode, we cover: πŸ“‘ How known vulnerabilities in telco infrastructure were exploited.πŸ“‘ The types of...
2024: The Breaking Point

2024: The Breaking Point

2024: The Breaking Point Listen to this episode of Threat Talks on 2024 – The Breaking Point One Year of Threat Talks As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan...