4.6 • 1K Ratings
🗓️ 12 June 2024
⏱️ 26 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | When it comes to ensuring your company has top-notch security practices, things can get complicated fast. |
0:21.0 | Vanta automates compliance for SOC2, ISO 2701, HIPAA and more, saving you time and money. |
0:29.7 | With Vanta you can streamline security reviews by automating questionnaires and |
0:34.2 | demonstrating your security posture with a customer-facing trust center. |
0:38.4 | Over 7,000 global companies like Atlassian, Flow Health, and Quora use Vanta to manage risk and prove security |
0:46.5 | in real time. |
0:48.4 | Our listeners can claim a special offer of $1,000 off Vanta at vanta.com slash cyber. |
0:55.8 | That's VANTA.com slash cyber for $1,000 off Banta. Dutch military intelligence warns of the Chinese coat hanger rat. |
1:19.0 | Your storage joins the growing list of snowflake victims, Jet Brains, patches a GitHub IDE vulnerability, |
1:27.0 | a data broker hits the brakes on selling driver location data, flaws in VLC media player, allow remote code execution. |
1:34.9 | We got some Patch Tuesday updates. |
1:36.9 | On our Learning Laird segment, |
1:38.4 | Host Sam Meisenberg and Joe Kerrigan |
1:40.5 | continue their discussion of Joe's ISC2 SISP certification journey, taking |
1:45.4 | on domain 8 software development security. |
1:49.0 | And Farewell Computer Engineering legend Lynn Conway. |
1:53.0 | It's Wednesday, June 12, 2024. I'm Dave Bittner and this is your cyberwire intel briefing. The Dutch military Intelligence and Security Service has issued a warning about an extensive |
2:27.4 | Chinese cyber espionage campaign. |
2:30.6 | According to the National Cybersecurity Center, state-sponsored hackers exploited a vulnerability in |
2:36.4 | fortigate devices for two months before it was disclosed. |
2:40.9 | This zero-day attack infected 14,000 devices targeting Western governments, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.