Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Technology
History
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/bf/f7/f3/bff7f3d7-7396-6109-71cf-04705753b08c/mza_7618852996947157642.jpg/600x600bb.jpg
Threat Talks - Your Gateway to Cybersecurity Insights
Threat Talks
79 episodes
5 days ago
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
Show more...
Tech News
News
RSS
All content for Threat Talks - Your Gateway to Cybersecurity Insights is the property of Threat Talks and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!
Show more...
Tech News
News
Episodes (20/79)
Threat Talks - Your Gateway to Cybersecurity Insights
OT’s Hidden Cyber Risks

From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind.

 

In this episode of Threat Talks, host Karin Muller is joined by TC Hoot (VP of Contracts at TAC) and Luca Cipriano (Threat Intel Specialist at ON2IT) to explore how airports, hospitals, ports, and even water systems can be compromised.

 

Key topics they tackle:

🛳️ Why are modern ships, airports, hospitals and even cities targeted?

🛡️ What makes OT so hard to secure compared to IT?

✈ What do real-world OT threats look like and how can we defend against them?

 

If you’ve ever asked “how could a fish tank lead to a casino breach?” or “can someone actually hack an airport’s baggage system?” this one’s for you.

Show more...
2 days ago
31 minutes 39 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Zero Trust Starts Here

Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business.

In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls, and how to kick off your Zero Trust journey from a solid, business-aligned foundation.

In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas get down to the basics of step one of Zero Trust: defining the protect surface.

They explore:

✅ Methods for defining protect surfaces

⛨ Establishing the relevance of each protect surface

📈 How to align your cybersecurity with business needs and goals

In this second episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify where to start with Zero Trust implementation, discuss the importance of business and board involvement and explain why starting small is key.


Show more...
1 week ago
22 minutes 6 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Zero Trust Demystified: What is Zero Trust Really About?

Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing?

In this kickoff episode of this Zero Trust series, Lieuwe Jan Koning and Rob Maas explore what Zero Trust actually is, how to think about it strategically, and why it’s not just about identity or buying new tools.


They discuss:

✅ Why Zero Trust isn’t a product, and what it actually is

🗺️ The five steps and four core principles of Zero Trust

🚧 Why business alignment – and not anything technical – is the hardest part of Zero Trust implementation

They debunk the most common myths, from “Zero Trust is identity” to “just buy a firewall,” and explain what it takes to embed Zero Trust into business operations. A must-watch, whether you’re just curious, are just starting your Zero Trust journey or are already well underway.


Show more...
2 weeks ago
20 minutes 28 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Inside Volt Typhoon: China’s Silent Cyber Threat

What happens when a cyber threat actor doesn’t want to make headlines? Volt Typhoon, a state-sponsored group tied to the People’s Republic of China, has been quietly infiltrating Western critical infrastructure, staying under the radar by avoiding malware, using native tools, and taking things slow.

 

In this episode of Threat Talks, Lieuwe Jan Koning is joined by Rob Maas and Luca Cipriano to break down how these attackers operate and what their endgame might be.

 

💨 What makes “low and slow” attacks so hard to detect?

🔧 How do living-off-the-land tactics help attackers blend in?

📉 What motivations do threat actors like Volt Typhoon have?

 

Volt Typhoon isn’t just another cyber threat: it’s a sign that the game has changed. If you’re focused on national security, infrastructure, or advanced threat defense, you won’t want to miss this episode.


Show more...
3 weeks ago
34 minutes 1 second

Threat Talks - Your Gateway to Cybersecurity Insights
Cybercrime-as-a-Service: The Disney+ of the Dark Web

Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+.

 

In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service.

 

Key questions answered in this Deep Dive:

🕶️ What are dark markets, and how do they work?

🔑        How do cybercriminals (or intrepid researchers) access these dark markets?

🎬        How is cybercrime becoming as accessible as a streaming service?

⚠️  What risks do businesses face from dark markets?

🔎        What role does threat intelligence plays in monitoring these markets?

 

With cybercrime as easy to access as a Netflix subscription, Rob and Michele explore how these underground marketplaces operate, how they’re changing the threat landscape, and what organizations can do to protect themselves.

Show more...
1 month ago
31 minutes 13 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Inside the Dark Web Economy: $10 for Your Identity & Corporate Access?

The Dark Web Economy: Hacks for $10?

Would you pay $10 for access to a corporate system? Because someone on the dark web already has. In this episode of Threat Talks, host Lieuwe Jan Koning talks to cybersecurity researcher Michele Campobasso about the business of cybercrime. From ransomware services to stolen credentials, the dark web is thriving.

 

💰 How much is YOUR data worth on the dark web?
🚨What’s for sale—and who’s buying?
🛒 How is hacking becoming a subscription-based service?

 

Cybercriminals operate like well-run businesses, offering hacking tools, stolen credentials, and even customer support. But if cybercrime is getting more sophisticated, what can individuals and businesses do to fight back?

Show more...
1 month ago
37 minutes 56 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Why Precision Time Matters in Cybersecurity | PTP vs NTP Explained

⏳ What happens when time goeswrong?

 

Time synchronizationis an overlooked but essential part of cybersecurity. A few microseconds ofdrift can lead to failed transactions, inaccurate forensic logs, or evensecurity breaches.

 

In this episode of ThreatTalks, host Rob Maas (Field CTO, ON2IT) and guest Jan van Boesschoten(Innovation Manager, AMS-IX) discuss:

 

·      How does time impact cybersecurity, and whathappens when it drifts?

·      Why is NTP no longer sufficient for high-speeddigital transactions?

·      How does Precision Time Protocol (PTP) providemicrosecond accuracy (and why does that matter)?

·      Could time manipulation be an attack vector,and how do organizations mitigate this risk?

 

From financialtransactions to forensic log analysis, knowing exactly when an eventoccurs can make or break an organization’s security posture.

Show more...
1 month ago
22 minutes 30 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Why SSL Decryption Matters

Many organizations hesitate to implement SSL decryption due to concerns over complexity, privacy, and performance. However, the reality is that failing to decrypt means failing to see threats.In this Deep Dive, host Lieuwe Jan Koning and Rob Maas (Field CTO at ON2IT) explore why decrypting SSL traffic is critical for cybersecurity.

  • Why is SSL decryption necessary, and what are the risks of ignoring encrypted traffic?
  • How do modern malware and attacks leverage encryption to bypass traditional security measures?
  • What are the top three things organizations must do to implement SSL decryption effectively?
  • Why do only 3.5% of organizations have an active SSL decryption policy, and how can this change?

Rob Maas explains how decrypting SSL traffic allows security teams to detect and stop threats at an early stage, preventing malware downloads, phishing attempts, and web-based attacks before they reach endpoints.

Show more...
1 month ago
48 minutes 12 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Intrusion Kill Chain: Stop Playing Defense with Rick Howard

Cybersecurity shouldn’t always be about playing defense – it can also be about disrupting attackers before they succeed. In this Deep Dive, host Lieuwe Jan Koning and cybersecurity expert Rick Howard break down the Intrusion Kill Chain and the strategic shift it introduced in the world of cybersecurity.


  •  How does the Intrusion Kill Chain flip the script on cyberattacks?
  • The 250 active adversary campaigns that security teams must track
  • How MITRE ATT&CK and the Diamond Model strengthen modern defense strategies
  • Why global governments and intelligence agencies aren’t doing more to share cyber threat intelligence

 

Despite decades of talk about intelligence sharing, most information is still exchanged manually, often via spreadsheets. As Howard points out, a true global threat-sharing framework could give defenders the upper hand.

Don’t miss this deep dive into adversary strategies and what they mean for the future of cybersecurity.


👕 Receive your Threat Talks T-shirt via https://threat-talks.com/

🗺️ Explore the Hack's Route in Detail 🗺️ via https://threat-talks.com

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
1 month ago
28 minutes 22 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Reboot of Strategy: Back to cybersecurity basics with Rick Howard

I think, therefore I am, is René Descartes’first principle. But how does that relate to cybersecurity?

 

In this episode of Threat Talks, hostLieuwe Jan Koning is joined by Rick Howard – former Commander of the US Army’sComputer Emergency Response Team and former CSO of Palo Alto Networks – todiscuss the first principle of cybersecurity.

 

❓What’s the difference between cybersecurity strategy and tactics?

❓How come some random geezers are better at cybersecurity forecastingthan industry pros?

❓Is resilience the ultimate cybersecurity strategy?

❓Why does Rick Howard think Zero Trust is a passive strategy? 

 

And for the book lovers amongst us – over500 cybersecurity books are published each year. Wanna know which are worthyour time?

 

Rick Howard’s Cybersecurity Canon has gotyou covered: https://icdt.osu.edu/about-cybersecurity-canon

👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
2 months ago
49 minutes 57 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
The Rising Threat of Deepfakes - Threat Talks Cybersecurity Podcast

🚨 Can you still trust what you see? 🚨


Deepfakes aren’t just for entertainment anymore: they’re now an increasingly powerful tool for cybercriminals. With AI advancing rapidly, attackers can clone voices, fake identities, and manipulate live video in real time.

In this episode of Threat Talks, we explore how deepfake scams have already cost companies millions.

From CEO voice fraud to bypassing identity checks, the risks are rising.

👥 How do deepfakes work?

👥 What makes them so dangerous?

👥 How can organizations protect themselves?


Join host Rob Maas and ON2IT SOC analyst Yuri Wit as they break down the latest deepfake threats and what you can do to stay ahead.

👕 Receive your Threat Talks T-shirt https://threat-talks.com/🗺️ Explore the Hack's Route in Detail

🗺️https://threat-talks.com

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
2 months ago
20 minutes 19 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Post-Quantum Threat to Encryption: Are You Ready? - Threat Talks Cybersecurity Podcast

Quantum computing promises unprecedented computational power, but it also threatens the encryption standards we trust today.

In this episode of Threat Talks, Jeroen Scheerder from ON2IT delves into post-quantum cryptography and answers key questions:

  • What is Quantum Computing?
  • Why does it challenge RSA and other encryption standards?
  • What is Q-Day, and when will it happen?
  • How can companies prepare for the post-quantum era?


🎯 Key Takeaways

🛡 Data minimization and post-quantum cryptographic algorithms are essential.

📈 Start planning your migration strategy now.

🚨 Don’t procrastinate – quantum computing is coming sooner than you think.

💻 More Resources: Visit Threat-Talks.com to stay informed on quantum computing and its impact on cybersecurity.


📢 Like, Subscribe & Share – Help us spread the word about preparing for the quantum age!=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/post-quantum-threat-to-encryption/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
2 months ago
21 minutes 22 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast

🔒 Are endpoint protection solutions enough to safeguard your organization?

In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.


Learn✅ The differences between AVs, EDRs, and XDRs

✅ Common bypass techniques used by attackers

✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy


💡 Key Insights

  • EDRs are essential but not invincible
  • Combining smart tools with robust security practices is the winning strategy


📩 Have questions or thoughts?

Reach out at team@threat-talks.com!

🎙️ Follow Threat Talks for weekly cybersecurity insights.=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/breaking-the-defenses-edr-bypass/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
2 months ago
25 minutes 16 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Inside the Hackers Mind with Tom van de Wiele - Threat Talks Cybersecurity Podcast

Ever wondered what it’s like to see cybersecurity through a hacker’s eyes? In this episode of Threat Talks, Lieuwe Jan Koning talks with Tom van der Wiele, ethical hacker and founder of Hacker Minded, about how cybercriminals operate and how businesses can defend themselves.


📌 What You’ll Learn:

  • The psychology and strategies of hackers• How AI enhances attacks and its implications for defenders
  • Common vulnerabilities organizations overlook
  • Why Zero Trust is critical for modern security
  • Building a proactive security culture in your organization


With over two decades of experience, Tom offers unique perspectives on staying one step ahead in the ever-evolving world of cybersecurity.

🎯 Don’t forget to like, share, and subscribe to stay informed on the latest cybersecurity insights. New episodes every Tuesday! === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/inside-the-hackers-mind/

🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
3 months ago
58 minutes 50 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Salt Typhoon: How Nine Telecom Providers were Compromised - Threat Talks Cybersecurity Podcast - Threat Talks Cybersecurity Podcast

Salt Typhoon: Inside the Coordinated Breach of Nine Telecom Providers

A sweeping cyberattack, known as Salt Typhoon, has exposed the vulnerabilities of nine major telcos, leaving sensitive communications and surveillance data in the hands of attackers. How did this happen, and what lessons can we learn?

In this Threat Talks Deep Dive, host Lieuwe Jan Koning teams up with ON2IT’s Rob Maas (Field CTO) and Jeroen Scheerder (Security Researcher) to dissect every aspect of this high-profile breach.

🔍 What you’ll learn:

  • How attackers exploited known vulnerabilities in Exchange servers, VPNs, and firewalls to infiltrate systems.
  • The risks associated with lawful interception systems and the exposure of call detail records (CDRs).
  • Why legacy infrastructure remains a significant cybersecurity challenge for telecom providers.
  • Actionable steps organizations can take to enhance defenses, including segmentation, behavioral monitoring, and Zero Trust frameworks.


This episode dives into the attack’s technical anatomy, discusses its implications for both governments and private organizations, and explores how individuals can secure their communications in an era of increasing surveillance.

Join us to understand how Salt Typhoon unfolded—and what it means for the future of telecom security.

🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/salt-typhoon-how-nine-telcos-were-compromised/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://threat-talks.com/downloads/

🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
3 months ago
29 minutes 52 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
ONCD: The Cyber Catalyst with Davis Hake - Threat Talks Cybersecurity Podcast

ONCD: The Cyber Catalyst with Davis Hake


How can governments lead the charge in global cybersecurity efforts? In this compelling episode of Threat Talks, host Lieuwe Jan Koning sits down with returning guest Davis Hake, cybersecurity expert and advisor, to explore the critical role governments play in the cyber landscape.

👾 The ONCD’s mission and its role in U.S. cybersecurity.

👾 Lessons from the Biden administration’s approach to combating ransomware and cybercrime.

👾 Why global collaboration is key to countering modern threats.

Watch now to uncover how governments and businesses can work together to secure the digital future.


🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/oncd-the-cyber-catalyst/ 🗺️ Explore 2024's Hack's Routes in Detail 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
3 months ago
45 minutes 22 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
The State of Cybersecurity in the European Union with Hans de Vries - Threat Talks

The State of Cybersecurity in the European Union

Cyber threats know no borders, and in the European Union, harmonizing cybersecurity efforts across 27 member states is no small feat. In this episode of Threat Talks, host Lieuwe Jan Koning speaks with Hans de Vries, Chief Cybersecurity and Operational Officer at ENISA, about the critical work being done to secure Europe’s digital future.

📌 Topics covered

  • How ENISA supports EU member states in managing cyber incidents and crisis responses.
  • The implementation of the NIS2 directive and upcoming Cyber Resilience Act.
  • The role of trust and collaboration in cross-border cybersecurity.
  • Why public-private partnerships are key to tackling cybersecurity challenges.

🎥 Watch now to explore how Europe is building a safer digital environment for its citizens and businesses.

👉 Don’t forget to like, subscribe, and share to help us spread the word!

Show more...
3 months ago
38 minutes 20 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Cyber Outlook 2025 - One Year of Threat Talks

2025: The Year of AI and Cybersecurity Evolution

Kick off 2025 with the latest insights from Threat Talks! In this episode, host Lieuwe Jan Koning sits down with Peter van Burgel, CEO of AMS-IX, to discuss how AI and cybersecurity are reshaping the landscape this year.


🚀 What’s inside this episode?

🔹 A sneak peek into AI advancements: Could we see virtual CEOs?

🔹 The rise of Zero Trust supply chain strategies.

🔹 Navigating the skills gap in an evolving digital world.

🔹 AI in cybersecurity: Opportunities, risks, and where to focus.

🔹 Power consumption and sustainability in AI’s rapid growth.

AMS-IX's role as a critical part of internet infrastructure and its cybersecurity responsibilities highlight the importance of collaboration and awareness in today’s complex geopolitical climate.


Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt https://threat-talks.com/cyber-outlook-2025-one-year-of-threat-talks/ 🗺️ Explore all 2024's Hack's in Detail 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

Show more...
4 months ago
41 minutes 42 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
2024: The Breaking Point - One Year of Threat Talks

🎥 Threat Talks - One Year of Insights with Peter van Burgel, CEO of AMS-IX As 2024 comes to a close, we’re celebrating a year of transformative conversations with a special edition of Threat Talks! Join Lieuwe Jan Koning and Peter van Burgel, CEO of AMS-IX, as they reflect on the past year’s most significant developments in cybersecurity and the lessons learned. In this Threat Talk, we: 👾 Look back at the major trends and threats of 2024. 👾 Discuss how organizations adapted to an ever-changing security landscape. 👾 Highlight key moments from Threat Talks throughout the year. Whether you're a cybersecurity enthusiast, a tech professional, or simply curious about how to safeguard the digital future, this episode is packed with insights you won't want to miss! 🔔 Don’t forget to like, subscribe, and hit the notification bell to stay updated with future episodes of Threat Talks. 👉Best way to support the channel: give us a like! 🎧 Available on all major podcast platforms. ► YOUTUBE: ⁠https://youtube.com/@ThreatTalks ⁠ ► SPOTIFY: ⁠https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ⁠ ► APPLE: ⁠https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 ⁠ 👕 Receive your Threat Talks T-shirt 👕 ⁠https://threat-talks.com/2024-the-breaking-point/


🗺️ Explore all 2024's infographics 🗺️ https://threat-talks.com/downloads/ 🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX

Show more...
4 months ago
47 minutes 2 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Dutch Law Enforcement Data Breach - Threat Talks Cybersecurity Podcast

Imagine the names, job functions, email addresses and phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when the Dutch Law Enforcement suffered a serious data breach in September of this year. Initially reported as a breach ‘only’ involving personal data of 65.000 law enforcement employees, it later became clear that much more data was leaked - and not just data from law enforcement personnel. In this Deep Dive, host Lieuwe Jan Koning, Security Expert Jeroen Scheerder and Field CTO Rob Maas take an in-depth look at how this breach unfolded, the poor security track record of the software that was used and what the Dutch Law Enforcement could’ve done better when it comes to handling the publicity of a data breach. 👉Best way to support the channel: give us a like! 🎧 Available on all major podcast platforms. ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Receive your Threat Talks T-shirt 👕 https://threat-talks.com/prevent-pay-or-insure/ 🗺️ Explore the Hack's Route in Detail 🗺️ https://on2it.s3.us-east-1.amazonaws.com/Threat-Talks-Prevent-Pay-or-Insure.pdf 🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX

Show more...
4 months ago
19 minutes 54 seconds

Threat Talks - Your Gateway to Cybersecurity Insights
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!