4.6 ⢠1K Ratings
đď¸ 28 October 2025
âąď¸ 42 minutes
đď¸ Recording | iTunes | RSS
đ§žď¸ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:09.5 | This exclusive N2K Pro subscriber-only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter, |
| 0:23.1 | building full-stack zero-trust networks from the ground up. |
| 0:25.1 | Trusted by security and network leaders everywhere, |
| 0:28.0 | meter delivers fast, secure by design, |
| 0:30.5 | and scalable connectivity |
| 0:31.9 | without the frustration, friction, |
| 0:34.6 | complexity, and cost |
| 0:36.1 | of managing an endless proliferation of vendors and tools. |
| 0:40.3 | Meter gives your enterprise a complete networking stack, secure wired, wireless, and cellular |
| 0:46.3 | in one integrated solution built for performance, resilience, and scale. |
| 0:51.6 | Go to meter.com slash CISOP today to learn more and book your demo. |
| 0:57.5 | That's M-E-T-E-R.com slash C-I-S-O-P. |
| 1:02.2 | Pop quiz today. |
| 1:16.0 | Which of the following situations is a violation of privacy? |
| 1:20.9 | One, a national retailer utilizes purchases you make with them to send you |
| 1:26.0 | advertisements about products you might enjoy your need. |
| 1:30.7 | Two, a reputable search engine utilizes data about you from previous searches and other products |
| 1:37.1 | to better tailor its content to your needs. |
| 1:41.1 | Or three, a government entity utilizes data in the public domain to hone in on potential criminals. |
| 1:49.0 | If you answered anything but it depends on this quiz, you haven't been following the nuances of the privacy debate. |
| 1:58.0 | Let's get a little deeper into each of these examples for just a moment. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright Š Tapesearch 2025.