4.6 • 1K Ratings
🗓️ 5 August 2024
⏱️ 19 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | Quick. Quick question. Do your end users always work on company-owned devices and IT approved |
0:20.4 | apps? If the answer is no, then my next question is, how do you keep |
0:25.6 | company data safe on all those unmanaged apps and devices? One password has an |
0:31.4 | answer to this question extended access management |
0:34.9 | One Password extended access management helps you secure every sign-in for every |
0:40.7 | app on every device because it solves the problem traditional IAM and |
0:45.6 | MDM can't touch. Check it out at one password.com slash |
0:50.8 | x-am that's one password.com slash |
0:55.0 | X AM. |
0:57.0 | Hey everybody, Rick here. |
1:04.4 | Rick here. Let's start with this. |
1:07.4 | Cybersecurity is radically asymmetrically distributed. |
1:11.2 | I first heard of this idea from an unusual source. |
1:16.0 | Malcolm Gladwell, the famous author and podcast host. |
1:19.0 | He gave one of the keynotes at the 2003 Google Mandiant |
1:23.3 | NYU's conference in Washington, D.C. |
1:26.1 | And you may be rightfully asking yourself, |
1:28.3 | what does a world-renowned author and podcast host |
1:31.2 | whose expertise is in the ballpark of the social sciences |
1:34.4 | know about the world of cyber security and why was he presenting the keynote |
1:39.2 | at one of the Infasek Professions flagship conferences. I'm glad you asked. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.