Threat Talks

Recent Episodes

Beyond NIS2 Compliance

Beyond NIS2 Compliance

Find Threat Talks onBeyond NIS2 Compliance Cyber resilience is supposed to protect organizations from disruption. Instead, it’s often reduced to policies, controls, and NIS2-driven compliance checklists. Documented. Audited. Approved. As digital systems become central...

Maritime Cybersecurity: Predictable = Hackable

Maritime Cybersecurity: Predictable = Hackable

Find Threat Talks onMaritime Cybersecurity: Predictable = Hackable Autonomous shipping is supposed to make the ocean safer by removing human error. Instead, predictability is turning vessels into steerable systems, vulnerable by design. Remote. Unmanned. Predictable....

Before the Mayday: Cyber Attacks at Sea

Before the Mayday: Cyber Attacks at Sea

Find Threat Talks onBefore the Mayday: Cyber Attacks at Sea Cyber attacks don’t stop at data centers.They now target ships, navigation systems, and global trade routes. From GPS spoofing to insider threats, the maritime industry is quietly becoming one of the most...

Looking Back at 2025

Looking Back at 2025

Find Threat Talks onLooking Back at 2025: Cybersecurity at a Turning Point Detection didn’t fail in 2025.It reached its limits - and many teams only realized it after the fact. The threat landscape didn’t suddenly become more sophisticated-it became faster, more...

BGP Vortex: Internet Kill Switch?

BGP Vortex: Internet Kill Switch?

Find Threat Talks onBGP Vortex: Internet Kill Switch? BGP is designed to keep the internet connected by constantly recalculating routes between networks. BGP Vortex flips that strength into a weakness. Instead of hijacking traffic or stealing data, it targets...

WSUS RCE: Update Weaponized

WSUS RCE: Update Weaponized

Find Threat Talks onWSUS RCE: Update Weaponized Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching. Instead, a single flaw turned it into one of the cleanest remote-code-execution paths in Windows...

Cybersecurity Infographics

Infographic Threat Talks - Prevent, Pay or Insure
Threat Talks - Infographic Security Fallacies
The evolution of cyber warfare infographic

JOIN THE CYBERSECURITY CONVERSATION

Subscribe to Threat Talks for in-depth explorations of recent cybersecurity threats and trends, with exclusive insights and expert perspectives.

Listen to Threat Talks - Cybersecurity Podcast on YouTube
Listen to Threat Talks - Cybersecurity Podcast on Spotify
Listen to Threat Talks - Cybersecurity Podcast on Apple Podcasts
Listen to Threat Talks - Cybersecurity Podcast on Amazon Music

presented by

on2it and aMS-ix