meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

And the Breachies go to…

CyberWire Daily

N2K Networks, Inc.

Tech News, News, Daily News, Technology

4.61K Ratings

🗓️ 24 December 2025

⏱️ 20 minutes

🧾️ Download transcript

Summary

In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar privacy failures keep repeating—and why they matter for users. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today’s we have a CyberWire holiday favorite: The 12 Days of Malware — with Dave and a lineup of cybersecurity friends gleefully rewriting The 12 Days of Christmas to celebrate malware, mishaps, and life online, one verse at a time. Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:11.4

Most environments trust far more than they should, and attackers know it.

0:16.3

Threat Locker solves that by enforcing default deny at the point of execution.

0:22.7

With Threat Locker Allow listing,

0:28.8

you stop unknown executables cold. With ring fencing, you control how trusted applications behave,

0:35.0

and with Threat Locker DAC, defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards.

0:41.4

Threat Locker is the simplest way to enforce zero-trust principles without the operational pain.

0:46.8

It's powerful protection that gives CISO's real visibility, real control, and real peace of mind.

0:53.2

Threat Locker makes zero-trust attainable, even for small security teams.

0:58.0

See why thousands of organizations choose Threat Locker to minimize alert fatigue,

1:02.4

stop ransomware at the source, and regain control over their environments.

1:07.1

Schedule your demo at Threatlocker.com slash N2K today.

1:26.6

We've got a lighthearted look back at 2025, one heck of a year, and warm holiday wishes from all of us to all of you.

1:39.0

You know. It's December 24th, 2025. I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thank you. Thanks for joining us here today.

2:11.6

It is Christmas Eve.

2:13.9

We're happy to have you with us here today.

2:16.4

Another year, another avalanche of data breaches.

2:20.3

At this point, the modern internet user no longer asks whether their data was exposed,

2:25.6

but rather how many times, and by whom?

2:29.1

Names, emails, medical records, location histories, selfies, IDs,

2:33.7

and the occasional deeply personal message

2:36.2

continue to spill out of corporate servers with such regularity that it feels less like an emergency

...

Transcript will be available on the free plan in 3 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2026.