4.8 • 45 Ratings
🗓️ 25 August 2017
⏱️ 31 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Welcome to the tech policy podcast. I'm Evan Swartzstrach. On today's show, Cybersecurity, we're going to update you on what's been going on. |
0:11.3 | North Korea is back in the news, not for good reasons, as the U.S. potentially heads for war with the rogue nation. |
0:17.4 | And, of course, the ongoing Russia story about the election. And as we gear up for a 2018 |
0:22.4 | midterm election in the United States, is our infrastructure ready, are our elections at risk |
0:27.5 | of tampering from foreign or domestic actors? And of course, there's been hacks involving private |
0:33.1 | companies and money being stolen. So with all this stuff going on and all these news stories |
0:37.1 | that you're being inundated with about cyber security, what should you think about? |
0:40.7 | How do you interpret these stories? Do they matter to you? Are these services you are using? |
0:45.4 | And if you're talking to your representatives in Congress or at the state and local level about |
0:49.2 | that your concerns about hacking, how can we make sure that that's a positive conversation |
0:53.5 | to the policymakers can make policies that's a positive conversation so the policymakers |
0:54.4 | can make policies that actually help keep our data secure without stifling innovation or |
1:00.3 | having otherwise adverse impacts? Joining me to discuss this topic, we have friend of the show, |
1:04.9 | Heather West, senior policy manager for the Americas at Mozilla. Heather, thanks for joining again. |
1:09.5 | Thanks for having me. And back for his second episode is Tech Freedom Executive Director Austin Carson. Austin, |
1:15.0 | thanks for joining. Always a pleasure. Always a pleasure. This is the second time. |
1:18.4 | Both times. Both times. It's been phenomenal. I've loved both times so far. |
1:21.2 | So, Heather, let's start with the recent, you know, relatively recent news items of want to cry and Petya. And, you know, when the average |
1:30.7 | person hears these terms, I mean, maybe they're not sure what the hell is going on, but what |
1:34.2 | exactly happened in these attacks? Like who was hacked and who's responsible and what are we doing |
1:39.1 | about it? So there's been a number of attacks using what are generally known as zero days or oh days |
1:45.2 | depending on which which camp you want to fall into but what that what that essentially means is |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.