goodlisten

Clip

DRATA Cloud Compliance Software
listen on Spotify
26:54 - 30:24 (03:30)

DRATA provides continuous monitoring and visibility for compliance with standards such as SOC 2, ISO 27001, GDPR, HIPAA, etc. Countless companies such as Notion, Lemonade, and Bamboo HR have chosen DRATA as their trusted compliance partner.

Similar Clips
A virus that was programmed to attack centrifuges in nuclear facilities was accidentally released into the facility network, infecting more systems than intended and causing damage to the centrifuges.
24:44 - 28:16 (03:31)
listen on Spotify
Cybersecurity
Summary

A virus that was programmed to attack centrifuges in nuclear facilities was accidentally released into the facility network, infecting more systems than intended and causing damage to the centrifuges.

Chapter
The Story of Stuxnet
Episode
Ep 29: Stuxnet
Podcast
Darknet Diaries
Microsoft was called in to conduct an analysis of Active Directory forest management for a bank after a security breach.
44:22 - 45:50 (01:27)
listen on Spotify
Security
Summary

Microsoft was called in to conduct an analysis of Active Directory forest management for a bank after a security breach. The company developed a security operations center and incident handling playbook to improve overall security.

Chapter
Cybersecurity breach at the World Bank
Episode
91: webjedi
Podcast
Darknet Diaries
The discussed malware scrapes data out of memory and sends it to a central repository system.
05:46 - 10:21 (04:35)
listen on Spotify
Malware Analysis, IP Address Tracking
Summary

The discussed malware scrapes data out of memory and sends it to a central repository system. IP address tracking helps to determine which accounts the malware is owned by and what systems they are communicating with.

Chapter
Credit Card Information Stolen Through Malware
Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
Publicly available exploits for recently disclosed vulnerabilities can help ensure that security measures are actually functioning as intended, as otherwise nobody can protect themselves from undisclosed threats.
38:03 - 39:28 (01:24)
listen on Spotify
Cybersecurity
Summary

Publicly available exploits for recently disclosed vulnerabilities can help ensure that security measures are actually functioning as intended, as otherwise nobody can protect themselves from undisclosed threats.

Chapter
Uncovering Security Vulnerabilities
Episode
114: HD
Podcast
Darknet Diaries
The idea that any app of Twitter's scale would use their own data centers made no technical sense.
23:36 - 26:23 (02:46)
listen on SpotifyListen on Youtube
Twitter
Summary

The idea that any app of Twitter's scale would use their own data centers made no technical sense. Outsourcing to Azure, GCP, and AWS can raise billions of dollars, while enforcing product hygiene is key to the user experience.

Chapter
The Future of TikTok's Infrastructure on Various Cloud Platforms
Episode
E99: Cheating scandals, Twitter updates, rapid AI advancements, Biden's pardon, Section 230 & more
Podcast
All-In with Chamath, Jason, Sacks & Friedberg