4.7 • 6.3K Ratings
🗓️ 2 March 2025
⏱️ 38 minutes
🧾️ Download transcript
On this episode of Newt's World, Newt welcomes Dr. Eric Cole, former CIA hacker and one of the country’s top cybersecurity experts, to discuss the pressing issues surrounding digital security. With over 30 years in the field, Dr. Cole shares insights on recent cyber breaches, the need for federal cybersecurity laws, and the ongoing cyber war that impacts us all. Dr. Cole's new book, Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, is available to purchase at Amazon and bookstores everywhere.
See omnystudio.com/listener for privacy information.
Click on a timestamp to play from that location
0:00.0 | On this episode of NUTS World, it's not often I get the opportunity to speak with someone |
0:08.3 | who used to be a professional hacker for the CIA. |
0:12.2 | My guest is Dr. Eric Cole. |
0:14.5 | He is a renowned cybersecurity expert, entrepreneur, and best-selling author with over 30 years of experience in the industry. |
0:22.9 | He is known for his work in advancing cybersecurity and his dedication to making the digital |
0:27.6 | world a safer place. He has advised some of the world's top companies on reducing their |
0:33.1 | digital threats and improving their cyber health. He's the author of the book, Cyber Crisis, Protecting Your Business from Real Threats in the |
0:41.7 | virtual world. |
0:52.7 | Eric, welcome and thank you for joining me on Newt's World. |
0:56.8 | My pleasure, and thank you for having me. |
0:58.9 | I'm very curious. |
0:59.8 | In December of last year, Chinese hackers breached a third-party vendor for the U.S. Treasury Department |
1:05.9 | to gain access to over 3,000 unclassified files. |
1:13.6 | How could this have happened, and what should the U.S. government learn from this? The reality is this is happening all the time. Most security vendors, |
1:22.6 | most companies, most organizations have been compromised or penetrated by the Chinese, the Russians, or the Iranians, |
1:32.5 | and we just didn't detect it. We didn't realize it. And we didn't know that it's happening. |
1:37.7 | So this is a much bigger problem that has been brewing for a long time. And unfortunately, |
1:42.4 | there's not been a lot of awareness around just |
1:44.8 | how bad the issue is. And governments and other organizations have to realize that the probability |
1:52.0 | of third party vendors or third party sources having a vulnerability or a compromise is very high. |
1:59.8 | And we need to redesign our systems. We need to |
2:03.2 | redesign how we're configured to protect against it. And most importantly, we need federal laws on |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Gingrich 360, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Gingrich 360 and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.