Threat Talks

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

Find Threat Talks onAI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and personal life. In this episode of Threat Talks, Lieuwe...

Splinternet Check: Zero Trust for a Fragmented Web

Splinternet Check: Zero Trust for a Fragmented Web

Find Threat Talks onSplinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules, values, and controls are...

Agentic AI: Hype, Hope, or Real Risk?

Agentic AI: Hype, Hope, or Real Risk?

Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...

Rethinking OT: It’s All Just Technology

Rethinking OT: It’s All Just Technology

Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...

OT’s Hidden Cyber Risks

OT’s Hidden Cyber Risks

Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...

Inside Volt Typhoon: China’s Silent Cyber Threat

Inside Volt Typhoon: China’s Silent Cyber Threat

Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little more than patience and native tools. In this...

Inside the Dark Web Economy

Inside the Dark Web Economy

Listen this Threat Talk onUnmasking the Dark Web How hackers monetize your data   Stolen credentials, hacked corporate systems, even illegal services: it’s all for sale, sometimes for as little as $10. In this episode of Threat Talks, host Lieuwe Jan Koning is...

Why SSL Decryption Matters

Why SSL Decryption Matters

Listen this Threat Talk onDecrypting Cyber Threats The top three tips for implementing decryption   With over 95% of web traffic now encrypted and 70% of cyberattacks leveraging encryption to evade detection, organizations that fail to decrypt their traffic are...

Precision Time Protocol

Precision Time Protocol

Listen this Threat Talk onPrecision Time Protocol Why time synchronization matters more than you think   Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field CTO at ON2IT) is joined by...

Reboot of Strategy – Back to first principles with Rick Howard

Reboot of Strategy – Back to first principles with Rick Howard

Listen this Threat Talk onReboot of Strategy Back to first principles with Rick Howard I think, therefore I am, is René Descartes’ first principle. But how does that relate to cybersecurity? In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Rick...

The Rising Threat of Deepfakes

The Rising Threat of Deepfakes

Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake...

Inside the Hackers Mind

Inside the Hackers Mind

Listen to this episode of Threat Talks onInside the Hackers Mind 👾 Ever wondered what it’s like to think like a hacker? In this Threat Talks episode, host Lieuwe Jan Koning is joined by ethical hacker Tom van de Wiele, founder of Hackerminded, for a deep dive into the...

Deep Dives

Promptlock – The First AI-Powered Malware

Promptlock – The First AI-Powered Malware

Find Threat Talks onPromptlock - The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a...

Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data

Find Threat Talks onData Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat...

Zero Trust Step 5A: Monitor and Maintain

Zero Trust Step 5A: Monitor and Maintain

Find Threat Talks onZero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right...

Blockchain in a Post-Quantum World

Blockchain in a Post-Quantum World

Find Threat Talks onBlockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this...

Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe?

Find Threat Talks onWindows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database....

Cybersecurity Without Borders

Cybersecurity Without Borders

Find Threat Talks onCybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the...

Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters?

Find Threat Talks onRed Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or...