Episodios

  • Zero Trust: From Revolution to Reality
    Mar 10 2026

    Zero Trust is easy to say. Hard to execute.

    Most organizations try to build it themselves.

    Most underestimate the complexity.
    Most get stuck in architecture diagrams instead of protecting what actually matters: data.


    If execution determines success – should you really be doing it alone?


    In this episode of Threat Talks, Lieuwe Jan Koning, Co-Founder and CTO at ON2IT Cybersecurity, sits down with Dr. Chase Cunningham, architect of the Zero Trust Extended (ZTX) framework, to break down what Zero Trust really requires in practice – not in theory.

    Zero Trust isn’t a product. It’s not a checkbox.

    It’s a decision about what you protect first – and how seriously you take execution.

    If your job is to protect critical data without drowning in complexity, this episode will recalibrate your approach.


    Because in the end, Zero Trust doesn’t fail on strategy.
    It fails on execution.

    Timestamps

    00:00 – Introduction to Zero Trust Data Protection

    00:50 – How Zero Trust Started at Forrester

    03:19 – The ZTX Framework and Structuring Zero Trust

    05:05 – Data at the Core of Zero Trust Data Protection

    08:22 – Success Factors for Effective Zero Trust Data Protection

    13:06 – Why Most Organizations Should Not DIY Zero Trust

    15:36 – Breaches, Misconfiguration, and Market Reality

    18:07 – How COVID Accelerated Zero Trust Adoption

    19:25 – Closing Thoughts on Zero Trust Fundamentals

    Key Topics Covered

    · Where Zero Trust actually started – and how it evolved beyond network segmentation

    · The shift from perimeter thinking to data-first protection

    · Why most internal Zero Trust programs stall

    · The operational discipline required to make Zero Trust work

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams

    · Threat Talks playlist on Zero Trust: https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g

    · Zero Trust Dictionary: https://on2it.net/resources/zero-trust-dictionary/


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    Más Menos
    20 m
  • China is Already Inside your infrastructure
    Mar 3 2026

    China is Already Inside your infrastructure.

    And the EU is done ignoring it.

    In this exclusive first discussion of the upcoming EU Cybersecurity Act revision, Bart Groothuis, MEP, joins Lieuwe-Jan Koning, CTO and Co-Founder, to explain why vendor dependency is now a board-level security risk.

    Groothuis breaks down how the revised EU Cybersecurity Act will shift Europe from soft guidance to hard enforcement - introducing formal “high-risk vendor” treatment inside critical infrastructure.

    This isn’t about secret backdoors.

    It’s about who controls the next update.
    Who enters your data center.
    And who can one day - switch off the grid.

    The revision brings non-technical risk - state influence, intelligence laws, geopolitical leverage - directly into cyber certification decisions. That means supply chain risk is no longer theoretical. It’s regulatory.


    And the impact goes far beyond telecom.
    Energy. Cloud. Transport. Enterprise IT.

    If your infrastructure depends on a vendor tied to a high-risk state, this conversation matters.

    Timestamps
    00:00 Opening & guest intro: MEP Bart Roos - rapporteur on EU legislation
    01:23 What the CSA revision targets - certification, telecoms, cloud
    09:11 Non-technical risk: intelligence laws, vendor-state ties, 5G implications
    15:10 What’s new in the Security Act Revision, 4G vs 5G - why virtualisation changes the security model

    17:17 Energy, inverters, and real-world dependency risks - blackouts
    21:53 What organisations & buyers should do now (roadmaps, phasing out risk)
    25:53 Final call to action & closing

    Key Topics Covered
    • Why the EU Cybersecurity Act revision treats non-technical vendor risk as policy, not just code review.
    • The difference between technical vulnerabilities and vendor/state dependencies (intelligence laws, personnel access).
    • 5G’s virtualised architecture: “winner takes all” risks and the limits of code audits.
    • Practical next steps for CISOs: vendor inventory, risk-based roadmaps, procurement levers and phasing strategies.

    Related ON2IT content & explicitly referenced resources
    ON2IT website: https://on2it.net/
    Threat Talks website: https://threat-talks.com/
    European Commission - Cybersecurity Act overview: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act
    Proposal for a Regulation for the EU Cybersecurity Act: https://digital-strategy.ec.europa.eu/en/library/proposal-regulation-eu-cybersecurity-act

    Subscribe and turn on notifications to stay ahead of emerging cyber policy, supply chain risk, and critical infrastructure security across IT and OT.
    ► YOUTUBE: /@threattalks
    ► Spotify / Apple Podcasts:

    Más Menos
    30 m
  • OpenClaw and The Dark Side of Agentic AI
    Feb 24 2026

    Your biggest threat this year isn’t malware. It’s your own AI assistant.

    OpenClaw connects an LLM directly to your terminal, browser, email, and chat.
    It runs with your permissions.
    It executes tasks without hesitation.

    Days after launch, researchers found a One-Click RCE.

    Cisco called it a security nightmare.

    Gartner called it an unacceptable risk.

    OpenClaw (formerly known as Clawdbot and Moltbot) represents a new phase of agentic AI: autonomous assistants operating inside your environment with almost no guardrails.

    The headlines around OpenClaw have been clear: it’s a serious threat. But how should we handle agentic AIs like OpenClaw moving forward?

    In this Threat Talks episode, Field CTO Rob Maas and SOC analyst Yuri Wit break down what OpenClaw actually does, where AI agent security breaks, and whether or not you should deploy OpenClaw.

    OpenClaw is powerful. It’s useful.

    It’s also proof that many of us are not ready for AI agents with this level of autonomy.

    Before you let an AI agent into your systems, understand what happens when it runs unchecked.

    Timestamps

    Key Topics Covered

    · How OpenClaw works and why agentic AI changes the security model

    · The One-Click RCE and what it reveals about AI agent security

    · Malicious skills, default allow design, and autonomous privilege abuse

    · Realistic mitigation strategies including sandboxing and controlled environments

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.


    Click here to view the episode transcript.

    🔔 Follow and Support our channel! 🔔

    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    Más Menos
    20 m
  • Inside the MongoBleed Memory Leak
    Feb 17 2026

    Imagine your memory just became the attack surface.
    That’s MongoBleed. Or as others know it: CVE-2025-14847. No passwords to crack, no complex exploit chain.

    Just normal protocol behavior, repeated at scale.

    Each request leaks a little more MongoDB memory until something valuable shows up, even in environments that already follow network segmentation best practices.

    Rob Maas (Field CTO, ON2IT) hosts Luca Cipriano (CTI & Red Team Program Lead) to dissect MongoBleed, an unauthenticated memory leak vulnerability in MongoDB, in this episode of Threat Talks.

    They break down how MongoBleed exploits MongoDB’s wire protocol before authentication and why repetition matters more than a single request.

    MongoDB is everywhere: cloud platforms, scalable applications, and data-heavy environments where availability matters more than friction. If MongoDB is part of your environment, or you want to understand how this vulnerability is exploited in practice, the full breakdown is worth your time.

    Timestamps

    Key Topics Covered

    · How malformed compressed messages manipulate MongoDB memory allocation

    · Why BSON string parsing can expose unintended data

    · How repeated burst requests turn small leaks into valuable information

    · Why MongoDB deployments are attractive targets in the cloud

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams

    · Threat Talks episode on Citrix Bleed: https://youtu.be/YwDpRPBfAzs


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    🔔 Follow and Support our channel! 🔔


    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    Más Menos
    14 m
  • How to pass any cybersecurity certification
    Feb 10 2026

    Certifications play a central role in cybersecurity career development.
    Yet many experienced engineers find themselves failing exams they should easily pass.

    The problem isn’t a lack of knowledge or skills.

    It’s the disconnect between real-world security work, and certifications built around memorization, UI trivia, and version-specific details that will be obsolete in two months.

    In this episode of Threat Talks, Rob Maas (Field CTO, ON2IT) and Nicholai Piagentini(Technical Enablement Engineer, ON2IT) break down why this happens, how certification exams are designed, and how to pass any cybersecurity certification without memorization or falling for trick questions.

    They explore how well-written exams validate real job tasks, while poorly designed ones drift into reading comprehension, UI trivia, and version-specific details that lose value the moment the product changes.

    From blueprint-driven preparation to smart elimination tactics and knowing when not to overthink an answer, this is a grounded look at how to pass any certification for meaningful cybersecurity qualifications.

    Timestamps


    Key Topics Covered

    · Why many certification exams fail at measuring real-world cybersecurity skills

    · How to pass cybersecurity certification exams by focusing on concepts, not memorization

    · What makes a good vs bad exam (and how vendors design them)

    · Practical tactics for exam day, preparation strategies, and dealing with nerves

    Resources

    · Threat Talks: https://threat-talks.com/

    · ON2IT (Zero Trust as a Service): https://on2it.net/

    · AMS-IX: https://www.ams-ix.net/ams


    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    🔔 Follow and Support our channel! 🔔


    ===


    ► YOUTUBE: / @threattalks

    ► SPOTIFY: https://open.spotify.com/show/1SXUyUE...

    ► APPLE: https://podcasts.apple.com/us/podcast...

    👕 Receive your Threat Talks T-shirt

    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️

    https://threat-talks.com

    Más Menos
    22 m
  • The Battle of Defending a Digital City
    Feb 3 2026

    When it comes to running an airport, there’s no room for error.

    Any casualty is one too much.

    That’s the reality of all airports, including DFW Airport. It’s a 28-square-mile operation, bigger than the island of Manhattan, functioning as a city with its own police, fire services, OT environments, and always-on digital infrastructure.

    In this Threat Talks episode, Lieuwe-Jan Koning (Co-Founder and CTO, ON2IT) sits down with Eric Bowerman (CISO of DFW Airport), to unpack how cybersecurity actually works when IT, OT, and physical safety collide.

    From digital transformation security to real-world OT security and IT/OT convergence, this is a rare, grounded look at defending critical infrastructure where failure isn’t theoretical - it’s operational.


    Timestamps


    Key Topics Covered

    • How a major airport functions as a digital city with IT, OT, and cyber-physical risk
    • Practical OT security strategies when patching and downtime aren’t options
    • Why IT/OT convergence changes threat modeling, segmentation, and detection

    Resilience-first security: keeping passengers, planes, and operations moving

    Click here to view the episode transcript.

    Related ON2IT Content & Referenced Resources

    Threat Talks website: https://threat-talks.com/
    ON2IT website: https://on2it.net/


    If you’re responsible for critical infrastructure, OT environments, or large-scale digital transformation, this episode is essential viewing.

    🔔 Subscribe and turn on notifications to stay ahead of emerging cyber threats across IT, OT, and critical infrastructure.

    ===
    ► YOUTUBE: / @threattalks
    ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E

    ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    Más Menos
    47 m
  • From IPs to people
    Jan 27 2026

    Detection fails without identity.
    When activity isn’t tied to a person, anomalies stop telling a story - they’re just signals without context. And when your logs only show IP addresses, your security team is left responding to shadows, not real risk.

    In this Threat Talks Deep Dive, Rob Maas (Field CTO, ON2IT) and Nicholai Piagentini (Technical Enablement Engineer, ON2IT) show how identity-based firewalling fixes that-by enforcing policy based on who the user is, not where they connect from.The result: stronger network access control, cleaner zero trust firewall enforcement, and better enterprise security decisions.

    • (00:56) - Intro - Detection fails without identity
    • (01:02:07) - Identity signals - users, devices, tags
    • (02:15:43) - Why identity-based firewalls win - zero trust & threat detection
    • (04:48:01) - Why teams skip it -“as-is” migrations & fear of complexity
    • (07:08:13) - Terminal servers - a network access control blind spot
    • (08:17:11) - NAT & service accounts - who is the real identity?
    • (10:15:12) - When user ID feels impossible - the wireless workaround
    • (11:12:12) - How to start safely - turn it on, validate, tighten policy
    • (14:16:30) - Not optional anymore - zero trust firewall due diligence
    • (15:30:01) - Best advice - start imperfect, identity data wins
    • (17:09:58) - Wrap - stop guessing, know who’s acting

    Key Topics Covered
    • Why anomaly detection breaks without identity correlation in firewall logs
    • How identity-based policy improves network access control and reduces lateral movement
    • Common failure points: terminal servers, NAT, service accounts, AD timeouts
    • A low-risk rollout: enable for visibility first, then enforce zero trust rules

    Related ON2IT content & explicitly referenced resources
    https://threat-talks.com/
    https://on2it.net/
    https://www.ams-ix.net/ams

    Threat Talks connects cyber threats to operational reality-so CISOs and architects can make decisions faster.

    Subscribe, follow, and turn on notifications to stay ahead of what changes enterprise security next.

    Click here to view the episode transcript.

    🔔 Follow and Support our channel! 🔔
    ===
    ► YOUTUBE: https://youtube.com/@ThreatTalks
    ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
    ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    👕 Receive your Threat Talks T-shirt
    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️
    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    Más Menos
    18 m
  • Beyond NIS2 Compliance
    Jan 21 2026

    Most organizations ask one question:
    “Are we compliant?”


    The question that actually matters is:
    “Will we still be operating when things go wrong?”


    In this Threat Talks episode, Lieuwe Jan Koning speaks with Jasper Nagtegaal about what NIS2 is really trying to change - and why cyber resilience fails when organizations treat it as a policy exercise instead of a business risk.


    This isn’t about regulators.
    It’s about how digital risk is explained, understood, and acted on - from technical teams to the boardroom - and why organizations that meet NIS2 in practice think very differently from those that end up explaining them.


    • (00:15) - Fine or resilience: the question that changes everything
    • (02:20:26) - Why cyber incidents are business failures, not IT failures
    • (05:30:35) - NIS2 in plain terms: resilience over compliance
    • (06:35:31) - Building resilience before incidents — not after fines
    • (13:31:12) - Risk-based focus: you can’t protect everything
    • (16:12:37) - Why consequences still matter - and when they appear
    • (18:37:18) - What cybersecurity can learn from aviation, energy & healthcare
    • (18:18) - Why digital risk is still treated as a compliance burden
    • (05:18:14) - Why cyber regulation works differently across countries
    • (09:14:13) - What to do tomorrow: risk, boards, and real accountability
    • (21:13:28) - Wrap: resilience first, compliance follows

    Speakers
    Lieuwe Jan Koning - Security Operations Center, ON2IT
    Jasper Nagtegaal - Director of Digital Resilience, Dutch Authority for Digital Infrastructure (RDI)

    Click here to view the episode transcript.

    Más Menos
    48 m