4.6 • 1K Ratings
🗓️ 25 April 2024
⏱️ 25 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | Today's episode is sponsored by SRM, your first call for cybersecurity and |
0:18.1 | investigations. Threats today are evolving faster than ever before and since 2005 SRM has pioneered |
0:25.3 | tailored security solutions for global corporations and their executives. |
0:29.5 | Whether it's defending against cyber attacks with their award-winning team of ethical hackers and incident response specialists, |
0:36.4 | or navigating the murky waters of compliance and ESG challenges, |
0:40.9 | SRMs, Insight and Straight straightforward advice will help you navigate complex risks |
0:46.4 | and emerge more resilient. |
0:48.4 | Their secret, a culture that nurtures the sharpest minds, giving them access to the newest technologies and the freedom |
0:55.3 | to solve problems in new ways, enabling them to craft simple effective solutions for your |
1:01.4 | unique cyber challenges. |
1:03.7 | Search your first call to discover how SRM can help your business. You're going to see. Sisko releases urgent patches for their adaptive security appliances. |
1:31.0 | Android powered smart TVs could expose g-mail inboxes. |
1:35.0 | The FTC refunds millions to Amazon Ring customers. |
1:38.6 | The DOJ charges crypto mixers with money laundering. |
1:42.1 | A critical vulnerability has been discovered in the |
1:44.4 | Flomon network monitoring tool. A Swiss blood donation company reopens following a |
1:49.6 | ransomware attack. Multiple vulnerabilities are discovered in the Brokade San Nave Storage Area Network |
1:55.5 | Management application. Brokwell is a new Android banking Trojan. |
1:59.7 | Meta's ad business continues to face scrutiny in the EU. |
2:04.0 | Ann Johnson, host of Microsoft Security Afternoon CyberT |
2:07.6 | podcast, speaks with LinkedIn's Cisso Jeff Belknaub. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.