4.6 • 1K Ratings
🗓️ 1 November 2025
⏱️ 21 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:10.2 | Risk and compliance shouldn't slow your business down. |
| 0:16.2 | Hyperproof helps you automate controls, integrate real-time risk workflows, |
| 0:20.5 | and build a centralized system of trust, |
| 0:23.4 | so your teams can focus on growth, not spreadsheets. |
| 0:27.3 | From faster audits to stronger stakeholder confidence, Hyperproof gives you the business advantage of smarter compliance. |
| 0:34.4 | Visit www.hyperproof.io to see how leading teams are transforming their GRC programs. |
| 0:46.3 | And now a word from our sponsor, Threat Locker, the powerful zero-trust enterprise solution that stops ransomware in its tracks. |
| 1:00.2 | Allow listing is a deny-by-default software that makes application control simple and fast. |
| 1:06.1 | Ring fencing is an application containment strategy, ensuring apps can only access the files, registry keys, |
| 1:13.2 | network resources, and other applications they truly need to function. |
| 1:17.8 | Shut out cybercriminals with world-class endpoint protection from threat locker. |
| 1:22.2 | Thank you. Hello everyone and welcome to the CyberWires Research Saturday. |
| 1:35.7 | I'm Dave Bittner, and this is our weekly conversation with researchers and analysts |
| 1:40.9 | tracking down the threats and vulnerabilities, solving some of the hard problems |
| 1:45.4 | and protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us. |
| 1:56.1 | First of all, the term IOPs stands for AI for IT applications. |
| 2:03.6 | And it's a term that has been around for a long time actually. |
| 2:08.6 | We saw the first appearance of the term in 2016, |
| 2:14.6 | where it was many about using machine learning models |
| 2:18.1 | to perform anomaly detections. |
| 2:21.1 | That's Dario Pasquini, principal researcher at RSAC Labs. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.