Podcast Episodes
Back to Search
Zero Trust Step 5B: Maintain Controls
Boards don’t buy dashboards—they buy assurance. Breaches are late-stage symptoms of drift: rules pile up, logs lose signal, cloud/Kubernetes outpace …
6 months, 4 weeks ago
Defend Against Hacktivist Groups like APT Handala | The Cyber Security Podcast
Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field …
7 months ago
Promptlock – The First AI-Powered Malware | The Cyber Security Podcast
First documented case: AI inside the breach.
Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Th…
7 months, 1 week ago
Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast
Your tools say “secure.” Your headers say “leaking.”
In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI & Red Team Lead) exposes Data Bouncing…
7 months, 2 weeks ago
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks?
In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning …
7 months, 3 weeks ago
Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast
Zero Trust step 5A is where monitoring turns raw logs into decisive action.
Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alo…
8 months ago
From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast
Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems…
8 months, 1 week ago
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast
Episode 5
One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Th…
8 months, 2 weeks ago
Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web
Episode 5
ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled…
8 months, 3 weeks ago
Zero Trust Step 4B: How to Secure Admin Access
Episode 5
Administrative accounts come with serious power – and serious power, comes with serious risk.
In part B of our deep dive into step four of Zero Trust …
8 months, 4 weeks ago