4min chapter

Hacker And The Fed cover image

A Leaked Ransomware Negotiation, Twitter Security, And NSA Best Practices For Securing Your Home Network

Hacker And The Fed

CHAPTER

G2's Cloud Compliance Partner - Dratah

Hector: Charging for a verification is a good idea. Twitter itself was exploding based over this topic specifically. With Dratah, G2's highest rated cloud compliance software, you'll have continuous monitoring and visibility into your risk, security controls, and audit readiness. Listners of hacker in the Fed can get 10% off Dratah and waive implementation fees at dratah.com slash partner slash hacker dashfed to include that link in our description.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode