1. EachPod
EachPod
Threat Talks - Your Gateway to Cybersecurity Insights - Podcast

Threat Talks - Your Gateway to Cybersecurity Insights

Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.

We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.

Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!

Tech News News
Update frequency
every 7 days
Average duration
29 minutes
Episodes
87
Years Active
2024 - 2025
Share to:
Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast

Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast

Your tools say “secure.” Your headers say “leaking.”
In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI & Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside H…

00:21:58  |   Tue 09 Sep 2025
AI, Play It Safe: Why CISOs Are Wrong to Ban AI

AI, Play It Safe: Why CISOs Are Wrong to Ban AI

Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks?

In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field …

00:44:54  |   Tue 02 Sep 2025
Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast

Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast

Zero Trust step 5A is where monitoring turns raw logs into decisive action.
Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap…

00:25:16  |   Tue 26 Aug 2025
From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast

From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast

Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid.

In this Threat Talks de…

00:25:11  |   Tue 19 Aug 2025
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast

Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast

One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out th…

00:13:45  |   Tue 12 Aug 2025
Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web

Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web

ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling…

00:39:31  |   Wed 06 Aug 2025
Zero Trust Step 4B: How to Secure Admin Access

Zero Trust Step 4B: How to Secure Admin Access

Administrative accounts come with serious power – and serious power, comes with serious risk.
In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning…

00:13:55  |   Tue 29 Jul 2025
Mastering Step Four of Zero Trust: Policy Creation

Mastering Step Four of Zero Trust: Policy Creation

Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero Trust: creating policy. In other words, it’s time …

00:25:46  |   Tue 22 Jul 2025
Blockchain in a Post-Quantum World

Blockchain in a Post-Quantum World

What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2IT Field CTO Rob Maas is joined by Jeroen Scheerder…

00:30:03  |   Tue 15 Jul 2025
Windows Recall: Convenience or Catastrophe?

Windows Recall: Convenience or Catastrophe?

Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help users find what they’ve seen or done: but that con…

00:23:08  |   Tue 08 Jul 2025
Agentic AI: Hype, Hope, or Real Risk?

Agentic AI: Hype, Hope, or Real Risk?

Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chance that within the next 10 years, AI could rule ov…

00:42:42  |   Tue 01 Jul 2025
Zero Trust Step Three: Build a Zero Trust Architecture

Zero Trust Step Three: Build a Zero Trust Architecture

It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architecture.In this episode of Threat Talks, Lieuwe Jan a…

00:39:04  |   Mon 23 Jun 2025
Cybersecurity Without Borders

Cybersecurity Without Borders

From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is crucial, but still complex. With differing policies, fr…

00:34:22  |   Tue 17 Jun 2025
Will AI Replace Human Pentesters?

Will AI Replace Human Pentesters?

AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI for everything from detection to response, the real…

00:40:24  |   Tue 10 Jun 2025
Rethinking OT: It's All Just Technology

Rethinking OT: It's All Just Technology

PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this episode of Threat Talks, host Lieuwe Jan Koning sit…

00:49:12  |   Tue 03 Jun 2025
Zero Trust Step 2: Map Transaction Flows

Zero Trust Step 2: Map Transaction Flows

Once you have defined a few protect surfaces (see: ⁠Step 1 of Zero Trust-video link below⁠), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one a…

00:13:08  |   Tue 27 May 2025
The OT Attack Cyber Kill Chain

The OT Attack Cyber Kill Chain

Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT deep dive: how does an OT attack work? In this Deep…

00:24:48  |   Tue 20 May 2025
Operational Technology for Dummies

Operational Technology for Dummies

From heating systems in Ukraine to petrochemical plant safety controls, Operational Technology (OT) systems are the hidden workhorses behind critical infrastructure: and they're wide open to cyber th…

00:26:08  |   Tue 13 May 2025
OT’s Hidden Cyber Risks

OT’s Hidden Cyber Risks

From ships and cities to hospitals and airports, Operational Technology (OT) keeps the world running. The problem? It was never designed with cybersecurity in mind.

 

In this episode of Threat Talks, h…

00:31:40  |   Tue 06 May 2025
Zero Trust Starts Here

Zero Trust Starts Here

Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business.

In step one of Zero Trust: define your protect surface, we focus on how to…

00:22:07  |   Tue 29 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Threat Talks. This content is not affiliated with or endorsed by eachpod.com.