Threat Talks

Why SSL Decryption Matters

Why SSL Decryption Matters

Listen this Threat Talk onDecrypting Cyber Threats The top three tips for implementing decryption   With over 95% of web traffic now encrypted and 70% of cyberattacks leveraging encryption to evade detection, organizations that fail to decrypt their traffic are...

Precision Time Protocol

Precision Time Protocol

Listen this Threat Talk onPrecision Time Protocol Why time synchronization matters more than you think   Time synchronization is a critical yet often overlooked component of cybersecurity. In this Deep Dive episode, host Rob Maas (Field CTO at ON2IT) is joined by...

Reboot of Strategy – Back to first principles with Rick Howard

Reboot of Strategy – Back to first principles with Rick Howard

Listen this Threat Talk onReboot of Strategy Back to first principles with Rick Howard I think, therefore I am, is René Descartes’ first principle. But how does that relate to cybersecurity? In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Rick...

The Rising Threat of Deepfakes

The Rising Threat of Deepfakes

Listen this Threat Talk onThe Rising Threat of Deepfakes Can you still trust what you see? Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake...

Inside the Hackers Mind

Inside the Hackers Mind

Listen to this episode of Threat Talks onInside the Hackers Mind 👾 Ever wondered what it’s like to think like a hacker? In this Threat Talks episode, host Lieuwe Jan Koning is joined by ethical hacker Tom van de Wiele, founder of Hackerminded, for a deep dive into the...

ONCD: The Cyber Catalyst

ONCD: The Cyber Catalyst

Listen to this episode of Threat Talks onONCD: The Cyber Catalyst with Davis Hake How can governments shape the future of cybersecurity? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert...

The State of Cybersecurity in the European Union

The State of Cybersecurity in the European Union

Listen to this episode of Threat Talks onThe State of Cybersecurity in the European Union Strengthening EU Cybersecurity: Insights from ENISA's Hans de Vries on Resilience and Collaboration In this insightful Threat Talk, Lieuwe Jan Koning is honored to be joined by...

Cyber Outlook 2025 – One Year of Threat Talks

Cyber Outlook 2025 – One Year of Threat Talks

Listen to this episode of Threat Talks onCyber Outlook 2025 2025: The Year of AI and Cybersecurity Evolution Welcome to the first episode of Threat Talks in 2025! Host Lieuwe Jan Koning is joined once again by Peter van Burgel, CEO of AMS-IX, to explore what this year...

2024: The Breaking Point

2024: The Breaking Point

Listen to this episode of Threat Talks on2024 - The Breaking Point One Year of Threat Talks As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel (CEO of...

Prevent, Pay or Insure

Prevent, Pay or Insure

Find this Threat Talk onPrevent, Pay or Insure? The road to cyber resilience Days before MGM’s computer systems were taken down in a cyberattack, fellow casino operator Caesars paid a $15 million ransom to attackers who infiltrated its systems. MGM chose not to pay...

Breaking the Illusion: Exposing Security Fallacies

Breaking the Illusion: Exposing Security Fallacies

Find this Threat Talk onExposing Security Fallacies Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies Are we truly protecting ourselves from cyber threats, or are we blinded by outdated security practices? In this episode of Threat Talks, ON2IT’s...

Hack the Boat

Hack the Boat

Find Threat Talks onHack the Boat Explore the cutting-edge of maritime cybersecurity Imagine you're the captain of a massive ship, cruising through open waters at full speed. Suddenly, something feels off... Are you veering off course? But your monitors show...

Deep Dives

Promptlock – The First AI-Powered Malware

Promptlock – The First AI-Powered Malware

Find Threat Talks onPromptlock - The First AI-Powered Malware If malware used to be predictable, those days are gone.With AI in the driver’s seat, malware has become a...

Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data

Find Threat Talks onData Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat...

Zero Trust Step 5A: Monitor and Maintain

Zero Trust Step 5A: Monitor and Maintain

Find Threat Talks onZero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right...

Blockchain in a Post-Quantum World

Blockchain in a Post-Quantum World

Find Threat Talks onBlockchain in a Post-Quantum World What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this...

Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe?

Find Threat Talks onWindows Recall: Convenience or Catastrophe? Imagine a tool that records everything you do on your computer and keeps it all stored in a searchable database....

Cybersecurity Without Borders

Cybersecurity Without Borders

Find Threat Talks onCybersecurity Without Borders From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the...

Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters?

Find Threat Talks onRed Teaming in the Age of AI What does it take to find the vulnerabilities that machines miss? As AI tools become more capable, the question isn’t whether or...