4.6 • 1K Ratings
🗓️ 18 November 2025
⏱️ 41 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:09.5 | This exclusive N2K Pro subscriber-only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter, |
| 0:23.1 | building full-stack zero-trust networks from the ground up. |
| 0:25.1 | Trusted by security and network leaders everywhere, |
| 0:28.0 | meter delivers fast, secure by design, |
| 0:30.5 | and scalable connectivity |
| 0:31.9 | without the frustration, friction, |
| 0:34.6 | complexity, and cost |
| 0:36.1 | of managing an endless proliferation of vendors and tools. |
| 0:40.3 | Meter gives your enterprise a complete networking stack, secure wired, wireless, and cellular |
| 0:46.3 | in one integrated solution built for performance, resilience, and scale. |
| 0:51.6 | Go to meter.com slash CISOP today to learn more and book your demo. |
| 0:57.5 | That's M-E-T-E-R.com slash C-I-S-O-P. |
| 1:08.5 | Consider the following four individuals. A British fashion designer, an American rap artist, |
| 1:16.5 | a Filipino influencer, and an old security guy. |
| 1:22.1 | While there are many, many differences between these folks, there is one important |
| 1:26.1 | similarity that is relevant to this |
| 1:27.9 | discussion, and that is this. Each of these individuals is named Kim Jones. With in-person |
| 1:36.5 | interactions, the differences between these four Kim Joneses would be obvious. It would be as |
| 1:41.9 | difficult for Kim Jones the Filipino influencer to masquerade as Kim Jones the old security guy, as it would be for me to impersonate the rapper Little Kim. |
| 1:52.0 | Online, though, any of these individuals could at least begin the process of accessing data that is restricted to my personal use by honestly and truthfully |
| 2:02.9 | providing their names. This example illustrates one of the fundamental challenges with |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.