Threat Talks
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
Find Threat Talks onAI, Play It Safe: Why CISOs Are Wrong to Ban AI AI is transforming the way we work and live. From boosting productivity to exposing sensitive data, the technology is reshaping both business and personal life. In this episode of Threat Talks, Lieuwe...
Splinternet Check: Zero Trust for a Fragmented Web
Find Threat Talks onSplinternet Check: Zero Trust for a Fragmented Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly western. From Europe to China to the Middle East, different rules, values, and controls are...
Agentic AI: Hype, Hope, or Real Risk?
Find Threat Talks onAgentic AI: Hype, Hope, or Real Risk? Andrew Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule over...
Rethinking OT: It’s All Just Technology
Find Threat Talks onRethinking OT: It's All Just Technology PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sits down...
OT’s Hidden Cyber Risks
Find Threat Talks onHack the Infrastructure OT’s Hidden Cyber Risks From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind. In this episode of Threat Talks,...
Inside Volt Typhoon: China’s Silent Cyber Threat
Find Threat Talks onInside Volt Typhoon China’s Silent Cyber Threat Volt Typhoon is a Chinese* state-sponsored threat actor that’s turned stealth into strategy, infiltrating Western critical infrastructure with little more than patience and native tools. In this...
Inside the Dark Web Economy
Listen this Threat Talk onUnmasking the Dark Web How hackers monetize your data Stolen credentials, hacked corporate systems, even illegal services: it’s all for sale, sometimes for as little as $10. In this episode of Threat Talks, host Lieuwe Jan Koning is...
Why SSL Decryption Matters
Listen this Threat Talk onDecrypting Cyber Threats The top three tips for implementing decryption With over 95% of web traffic now encrypted and 70% of cyberattacks leveraging encryption to evade detection, organizations that fail to decrypt their traffic are...
Precision Time Protocol
Listen this Threat Talk onPrecision Time Protocol Why time synchronization matters more than you think Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field CTO at ON2IT) is joined by...
Reboot of Strategy – Back to first principles with Rick Howard
Listen this Threat Talk onReboot of Strategy Back to first principles with Rick Howard I think, therefore I am, is René Descartes’ first principle. But how does that relate to cybersecurity? In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Rick...
The Rising Threat of Deepfakes
Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake...
Inside the Hackers Mind
Listen to this episode of Threat Talks onInside the Hackers Mind 👾 Ever wondered what it’s like to think like a hacker? In this Threat Talks episode, host Lieuwe Jan Koning is joined by ethical hacker Tom van de Wiele, founder of Hackerminded, for a deep dive into the...
Deep Dives
Promptlock – The First AI-Powered Malware
Find Threat Talks onPromptlock - The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a...
Data Bouncing: How HTTP Headers Leak Data
Find Threat Talks onData Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat...
Zero Trust Step 5A: Monitor and Maintain
Find Threat Talks onZero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right...
Russia’s Seashell Blizzard: Stealth Attacks to Wipers
Find Threat Talks onRussia’s Seashell Blizzard: Stealth Attacks to Wipers They’ve been called Sandworm, APT 44, Iron Viking, and Electrum. But whatever the name, Seashell...
SignalGate: Wrong Contact, Classified Chat Leak
Find Threat Talks onSignalGate: Wrong Contact, Classified Chat Leak When a group of U.S. government and military officials chose Signal to share classified information, they...
Zero Trust Step 4B: How to Secure Admin Access
Find Threat Talks onZero Trust Step 4B: How to Secure Admin Access Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers. In part B of...
Mastering Step Four of Zero Trust: Policy Creation
Find Threat Talks onMastering Step Four of Zero Trust: Policy Creation Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust...
Blockchain in a Post-Quantum World
Find Threat Talks onBlockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this...
Windows Recall: Convenience or Catastrophe?
Find Threat Talks onWindows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database....
Zero Trust Step Three: Build a Zero Trust Architecture
Find Threat Talks onZero Trust Step 3: From Ideas to Implementation Build a Zero Trust Architecture Now that you’ve defined your protect surfaces and mapped your transaction...
Cybersecurity Without Borders
Find Threat Talks onCybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the...
Will AI Replace Human Pentesters?
Find Threat Talks onRed Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or...