Below you will find pages that utilize the taxonomy term “CyberSecurity”
E12 - One Year of IT on TAP: Viruses, Antivirus, and a Bold Blond
Episode Summary
IT on TAP turns 1 year old! 🎉 In this milestone 12th episode, Nick and Pieter raise a glass to celebrate a full year of monthly tech-and-beer conversations.
This time, we dive into the fascinating history of computer viruses—from the earliest digital mischief-makers to today’s sophisticated cyber threats—and explore how antivirus software emerged in an ever-escalating arms race between attackers and defenders. Along the way, we uncover quirky virus stories, surprising facts, and how this cat-and-mouse game still shapes cybersecurity today.
E9 - CVE Clowns
Episode 9: CVE Clowns
Episode Summary
In this episode of IT on TAP, Pieter and Nick crack open a bottle of The Circus IPA (courtesy of the clown himself) and dive into the world of Common Vulnerabilities and Exposures (CVEs). We break down what the CVE program is, why it matters, and how it shapes the constantly evolving battlefield of cybersecurity. Along the way, we share real stories—from our own experiences and beyond—that highlight just how impactful (and sometimes bizarre) vulnerabilities can be.
E8 - Pieter's Villain Arc
Episode 8: Pieter’s Villain Arc
Episode Summary
In this episode of IT on Tap, things take a turn as Pieter embraces his dark side—at least when it comes to cybersecurity. We crack open three new beers while diving into the risks of public Wi-Fi while traveling, lockdown beers and tech, and some wild insights from Bsides Limburg, including SSL cryptography hacking. Will Pieter use his newfound knowledge for good or evil? Tune in to find out—over a cold one, of course.
E5 - Zero Trust, Big Moves: Securing 2025 with SASE and ZTNA
Episode 5: Zero Trust, Big Moves: Securing 2025 with SASE and ZTNA
Episode Summary
In this New Year’s special, hosts Pieter and Nick explore the cutting-edge world of cybersecurity, focusing on SASE (secure access service edge) & Zero Trust Network Access (ZTNA) and its transformative role in securing modern IT environments. They discuss how ZTNA compares to traditional perimeter security, tackle the challenges of integrating. Packed with insights and practical advice, this episode will help you make bold, secure moves in 2025 because, in today’s digital world, trust isn’t given—it’s verified.
E3 - Cyber October: Hacks, Attacks and Super 8 Chats
Episode 3: Cyber October: Hacks, Attacks and Super 8 Chats
Episode Summary
In this episode of I.T. on TAP, Pieter and Nick dive into the latest cybersecurity breaches, dissecting who got hacked and attacked this month. The conversation then shifts to a deep dive into the past and future of local admin access, discussing the evolution of local admin rights, the security risks involved, and best practices for managing access in today’s digital landscape. Tune in for an engaging and informative discussion.
The Security Maturity Grind in 2025
Security is an arms race
In the world of Cyber Security, we are always one step behind as defenders, and this makes total sense. In the past I’ve learned you have 2 kinds of people, ones that will do first, think later and then do again or the ones that think first, then do and then think again. In both cases there is a reflective moment. In a perfect world, where no crime nor malicious intent exists, we wouldn’t need security. Let’s look at this from another perspective.