meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Steve Blank, national security, and the dilemma of technology disruption. (Part 1 of 2)

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 22 September 2024

⏱️ 39 minutes

🧾️ Download transcript

Summary

In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. In this series, Steve Blank, a renowned expert in national security innovation, explores the critical challenges facing the U.S. Department of Defense in a rapidly evolving technological landscape. From the rise of global adversaries like China to the bureaucratic obstacles hindering defense innovation, Blank breaks down the “dilemma of technology disruption” in national security. Learn how the U.S. can overcome its outdated systems, accelerate innovation, and prepare for the future of defense technology. Whether you’re interested in defense tech, cybersecurity, or government innovation, this episode offers deep insights into the intersection of national security and technological disruption. For some background, you can check out Steve’s article “Why Large Organizations Struggle With Disruption, and What to Do About It.” Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Your... Your organization could be at risk due to common password sharing practices.

0:20.0

Imagine this scenario.

0:22.0

You're out of the office, colleague pings you, because they need access to some system that only

0:27.1

you have credentials for.

0:29.8

Now of course our listeners would never send a password over email or slack.

0:34.2

We know that.

0:35.2

But what about your coworkers?

0:37.3

How many organizations out there are sending logins back and forth in plain text?

0:42.4

Worse yet. How many just store all of their logins on a shared

0:46.9

spreadsheet? Now we all know human errors are the biggest threat to your organization's security, but did you know that it accounts

0:54.8

for over 68% of all data breaches?

0:59.5

What you need is a

1:03.0

secure fashion,

1:04.0

set access permissions or time controls

1:06.0

and monitor the dark web

1:08.0

for stolen logins.

1:10.0

Keeper Security Government Cloud

1:12.0

is a zero knowledge solution that does just that.

1:16.0

Plus, it is Fed Ramp and State Ramp authorized.

1:20.0

Want to see Keeper in action?

1:22.0

Schedule a demo or request a trial today by visiting Keeper.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.