Podcast Episodes

Back to Search
Mastering Step Four of Zero Trust: Policy Creation

Episode 5

Now that you’ve defined your protect surfaces, mapped your transaction flows and built your Zero Trust architecture, it’s time for step four of Zero …

9 months ago

Short Long
View Episode
Blockchain in a Post-Quantum World

Episode 5

What does quantum computing mean for blockchain? And how should platforms respond before Q-day becomes reality? In this episode of Threat Talks, ON2I…

9 months, 1 week ago

Short Long
View Episode
Windows Recall: Convenience or Catastrophe?

Episode 5

Windows Recall is a new feature in Windows 11 that captures screenshots every few seconds and stores them in a local database. It’s designed to help …

9 months, 2 weeks ago

Short Long
View Episode
Agentic AI: Hype, Hope, or Real Risk?

Episode 5

Andy Grotto (founder and director of the Program on Geopolitics, Technology and Governance at Stanford University) puts it plainly: there's a 5% chan…

9 months, 3 weeks ago

Short Long
View Episode
Zero Trust Step Three: Build a Zero Trust Architecture

Episode 5

It’s time to get practical. After identifying protect surfaces and mapping flows, the third step in Zero Trust is about designing the actual architec…

10 months ago

Short Long
View Episode
Cybersecurity Without Borders

Episode 5

From sovereign clouds to Zero Trust, and from cross-border investments to threat intelligence sharing, cooperation between the US and Europe is cruci…

10 months, 1 week ago

Short Long
View Episode
Will AI Replace Human Pentesters?

Episode 5

AI vs. Human Pentesting: Who Wins?What happens when you try to automate something that’s part science, part art? In an industry rushing to adopt AI f…

10 months, 2 weeks ago

Short Long
View Episode
Rethinking OT: It's All Just Technology

Episode 5

PLCs with default passwords. Devices searchable online. Siloed asset inventories. These OT challenges are common, but they’re also fixable. In this e…

10 months, 3 weeks ago

Short Long
View Episode
Zero Trust Step 2: Map Transaction Flows

Episode 5

Once you have defined a few protect surfaces (see: ⁠Step 1 of Zero Trust-video link below⁠), the next step is to start mapping the transaction flows:…

11 months ago

Short Long
View Episode
The OT Attack Cyber Kill Chain

Episode 5

Now that we know what a PLC, HMI and SCADA are (check out last week’s episode for a refresher if you need one!), we’re ready for part two of our OT d…

11 months, 1 week ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us