Threat Talks
Defending a Digital City
Find Threat Talks onThe Battle of Defending a Digital City Running an airport leaves no room for error.Any casualty is one too much. An airport isn’t just terminals and runways.It’s a city. Police. Fire services. Operations. OT systems. IT networks.All running 24/7....
Beyond NIS2 Compliance
Find Threat Talks onBeyond NIS2 Compliance Cyber resilience is supposed to protect organizations from disruption. Instead, it’s often reduced to policies, controls, and NIS2-driven compliance checklists. Documented. Audited. Approved. As digital systems become central...
Before the Mayday: Cyber Attacks at Sea
Find Threat Talks onBefore the Mayday: Cyber Attacks at Sea Cyber attacks don’t stop at data centers.They now target ships, navigation systems, and global trade routes. From GPS spoofing to insider threats, the maritime industry is quietly becoming one of the most...
From Hacker to Hero
Find Threat Talks onFrom Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work - as a 15-year-old gamer with a puzzle habit? In this episode of Threat Talks, host Lieuwe Jan Koning sits down with former FBI Supervisory Special Agent...
Inside the SalesLoft Breach
Find Threat Talks onInside the SalesLoft Breach SaaS was sold as safe — Inside the Salesloft Breach shows why it wasn’t.Hosts Rob Maas and Luca Cipriano expose how long-lived OAuth tokens and trusted integrations turned Salesforce, Salesloft, and Drift into silent...
The Secret Diplomats Fighting Cyber Wars
Find Threat Talks onThe Secret Diplomats Fighting Cyber Wars Every cyberattack headline hides a story of negotiation and restraint. In this episode of Threat Talks, Lieuwe Jan Koning talks with Ernst Noorman, Ambassador at Large for Cyber Affairs of the Kingdom of the...
Resilience Over Fragmentation
Find Threat Talks onResilience Over Fragmentation: The Risk You Can’t Ignore In this Threat Talks episode, Lieuwe Jan Koning sits with Professor Bart Jacobs to show—through simple, real stories—how scattered tools and ad-driven platforms take away control, and how...
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
Find Threat Talks onAI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and personal life. In this episode of Threat Talks, Lieuwe...
Splinternet Check: Zero Trust for a Fragmented Web
Find Threat Talks onSplinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules, values, and controls are...
Agentic AI: Hype, Hope, or Real Risk?
Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...
Rethinking OT: It’s All Just Technology
Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...
OT’s Hidden Cyber Risks
Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...
Deep Dives
How to pass any cybersecurity certification
Find Threat Talks onHow to pass any cybersecurity certification Certifications are meant to validate real skills and prove meaningful qualifications.In cybersecurity, they often...
From IPs to People
Find Threat Talks onFrom IPs to PeopleDetection only works when activity is tied to identity. Most networks still enforce access and investigate incidents using IP addresses. But...
Maritime Cybersecurity: Predictable = Hackable
Find Threat Talks onMaritime Cybersecurity: Predictable = Hackable Autonomous shipping is supposed to make the ocean safer by removing human error. Instead, predictability is...
Looking Back at 2025
Find Threat Talks onLooking Back at 2025: Cybersecurity at a Turning Point Detection didn’t fail in 2025.It reached its limits - and many teams only realized it after the fact....
BGP Vortex: Internet Kill Switch?
Find Threat Talks onBGP Vortex: Internet Kill Switch? BGP is designed to keep the internet connected by constantly recalculating routes between networks. BGP Vortex flips that...
WSUS RCE: Update Weaponized
Find Threat Talks onWSUS RCE: Update Weaponized Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching. Instead, a...
Bad Successor: The Service Account Flaw to Watch
Find Threat Talks onBad Successor: The Service Account Flaw to Watch Windows Server 2025 introduced DMSA - a “secure by design” upgrade meant to modernize service...
From Hacker to Hero
Find Threat Talks onFrom Hacker to Hero What if the most determined hacker you’ll face in 2030 is already at work - as a 15-year-old gamer with a puzzle habit? In this episode of...
The Npm Worm Outbreak
Find Threat Talks onThe Npm Worm Outbreak For the first time, the world’s biggest open-source ecosystem saw a worm that spread on its own.No botnet. No manual upload. Just...
The App Store Nightmare: The AI MCP Stores Trap
Find Threat Talks onThe App Store Nightmare: Why AI MCP Stores Are a Trap The app store nightmare is here - and you’re already in it. AI “helpers” (agents) powered by MCP (a...
Patch Smarter, Not Harder
Find Threat Talks onPatch Smarter, Not Harder Alarm bell: “Patch Smarter, Not Harder”. Hosts Lieuwe Jan Koning and Rob Maas show why patch management without Zero Trust is a risk...
Public Key Infrastructure: Digital Trust Foundation
Find Threat Talks onPublic Key Infrastructure: The Foundation of Digital Trust PKI isn’t paperwork.It’s the switch that turns digital trust on—or off.Set it up right and you get...






















