4.6 • 1K Ratings
🗓️ 5 June 2024
⏱️ 27 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | The IT world used to be simpler. You only had to secure and manage environments that you controlled. |
0:20.0 | Then came new technologies and new ways to work. Now employees, apps, and networks are everywhere. |
0:27.0 | This means poor visibility, security gaps, and added risk. |
0:31.0 | That's why Cloudflare created the first ever connectivity cloud. |
0:35.6 | Visit Cloud.com to protect your business everywhere you do business. Open AI Open describe a culture of recklessness and secrecy. |
0:58.0 | Concerns over Uganda's biometric ID system. |
1:01.0 | Sophos uncovers a Chinese cyber espionage operation called Crimson Palace. |
1:06.0 | Poland aims to shore up cyber defenses against Russia. |
1:10.0 | Zizil warns of critical vulnerabilities in a legacy NAS product. |
1:14.4 | Arctic Wolf tracks an amateurish ransomware variant named FOG, a Tik-TOC Zero Day targets |
1:20.3 | high profile accounts. |
1:22.0 | Cisco patches a WebX vulnerability that exposed German government |
1:25.7 | meetings. |
1:26.8 | On our learning layers segment, host Sam Meisenberg and Joe Kerrigan continue their |
1:31.2 | discussion of Joe's ISC 2 CISSP certification journey diving |
1:36.3 | into domain 7 security operations. |
1:40.0 | And a Canadian data breach leads to a class action payday. It's Wednesday, June 5th, 2024. I'm Dave Bitner and this is your cyberwire Intel briefing. Thank you for joining us here today. It is great to have you with us. |
2:19.0 | A group of open AI insiders, including nine current and former employees, |
2:26.0 | is exposing what they describe as a culture of recklessness and secrecy at the company, the New York Times reports. |
2:33.8 | The insiders claim Open AI prioritizes profits over safety in its race to develop artificial |
2:40.3 | general intelligence or AGI, the insiders accused the company of using restrictive |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.