Threat Talks

Defending a Digital City

Defending a Digital City

Find Threat Talks onThe Battle of Defending a Digital City Running an airport leaves no room for error.Any casualty is one too much. An airport isn’t just terminals and runways.It’s a city. Police. Fire services. Operations. OT systems. IT networks.All running 24/7....

Beyond NIS2 Compliance

Beyond NIS2 Compliance

Find Threat Talks onBeyond NIS2 Compliance Cyber resilience is supposed to protect organizations from disruption. Instead, it’s often reduced to policies, controls, and NIS2-driven compliance checklists. Documented. Audited. Approved. As digital systems become central...

Before the Mayday: Cyber Attacks at Sea

Before the Mayday: Cyber Attacks at Sea

Find Threat Talks onBefore the Mayday: Cyber Attacks at Sea Cyber attacks don’t stop at data centers.They now target ships, navigation systems, and global trade routes. From GPS spoofing to insider threats, the maritime industry is quietly becoming one of the most...

From Hacker to Hero

From Hacker to Hero

Find Threat Talks onFrom Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work - as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI Supervisory Special Agent...

Inside the SalesLoft Breach

Inside the SalesLoft Breach

Find Threat Talks onInside the SalesLoft Breach SaaS was sold as safe — Inside the Salesloft Breach shows why it wasn’t.Hosts Rob Maas and Luca Cipriano expose how long-lived OAuth tokens and trusted integrations turned Salesforce, Salesloft, and Drift into silent...

The Secret Diplomats Fighting Cyber Wars

The Secret Diplomats Fighting Cyber Wars

Find Threat Talks onThe Secret Diplomats Fighting Cyber Wars Every cyberattack headline hides a story of negotiation and restraint. In this episode of Threat Talks, Lieuwe Jan Koning talks with Ernst Noorman, Ambassador at Large for Cyber Affairs of the Kingdom of the...

Resilience Over Fragmentation

Resilience Over Fragmentation

Find Threat Talks onResilience Over Fragmentation: The Risk You Can’t Ignore In this Threat Talks episode, Lieuwe Jan Koning sits with Professor Bart Jacobs to show—through simple, real stories—how scattered tools and ad-driven platforms take away control, and how...

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

Find Threat Talks onAI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and personal life. In this episode of Threat Talks, Lieuwe...

Splinternet Check: Zero Trust for a Fragmented Web

Splinternet Check: Zero Trust for a Fragmented Web

Find Threat Talks onSplinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules, values, and controls are...

Agentic AI: Hype, Hope, or Real Risk?

Agentic AI: Hype, Hope, or Real Risk?

Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...

Rethinking OT: It’s All Just Technology

Rethinking OT: It’s All Just Technology

Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...

OT’s Hidden Cyber Risks

OT’s Hidden Cyber Risks

Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...

Deep Dives

How to pass any cybersecurity certification

How to pass any cybersecurity certification

Find Threat Talks onHow to pass any cybersecurity certification Certifications are meant to validate real skills and prove meaningful qualifications.In cybersecurity, they often...

From IPs to People

From IPs to People

Find Threat Talks onFrom IPs to PeopleDetection only works when activity is tied to identity. Most networks still enforce access and investigate incidents using IP addresses. But...

Looking Back at 2025

Looking Back at 2025

Find Threat Talks onLooking Back at 2025: Cybersecurity at a Turning Point Detection didn’t fail in 2025.It reached its limits - and many teams only realized it after the fact....

BGP Vortex: Internet Kill Switch?

BGP Vortex: Internet Kill Switch?

Find Threat Talks onBGP Vortex: Internet Kill Switch? BGP is designed to keep the internet connected by constantly recalculating routes between networks. BGP Vortex flips that...

WSUS RCE: Update Weaponized

WSUS RCE: Update Weaponized

Find Threat Talks onWSUS RCE: Update Weaponized Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching. Instead, a...

From Hacker to Hero

From Hacker to Hero

Find Threat Talks onFrom Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work - as a 15-year-old gamer with a puzzle habit? In this episode of...

The Npm Worm Outbreak

The Npm Worm Outbreak

Find Threat Talks onThe Npm Worm Outbreak   For the first time, the world’s biggest open-source ecosystem saw a worm that spread on its own.No botnet. No manual upload. Just...

Patch Smarter, Not Harder

Patch Smarter, Not Harder

Find Threat Talks onPatch Smarter, Not Harder Alarm bell: “Patch Smarter, Not Harder”. Hosts Lieuwe Jan Koning and Rob Maas show why patch management without Zero Trust is a risk...