Deep Dive – Securing AIS

Deep Dive – Securing AIS

Deep Dive – Securing AIS Securing AIS AIS (Advanced Identification System) is an incredibly important tool in maritime navigation, allowing ships to transmit their location and data to other vessels and satellites, preventing collisions and aiding in rescue...
Hack the Boat

Hack the Boat

Hack the Boat Find Threat Talks on Hack the Boat Explore the cutting-edge of maritime cybersecurity Imagine you’re the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off… Are you veering off course? But...
Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance

Deep Dive – Accellion File Transfer Appliance Find Threat Talks on Accellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely trusted, certified and compliant with...
Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance

Bridging the Gap: Security and Compliance Find Threat Talks on Bridging the Gap What’s more important: compliance or cybersecurity? Explore the often-overlooked operational gap between compliance and actual security in episode #33 of Threat Talks. While many...
Deep Dive – APT Sand Eagle

Deep Dive – APT Sand Eagle

Deep Dive – APT Sand Eagle Find Threat Talks on Advanced Persistent Threat Sand Eagle ‘Sand Eagle’ made headlines 📰 for its ability to infiltrate some of the most secure devices on the market—iPhones 📱 used by high-profile Russian officials. Dive Deep into the...