Risky Bulletin cover image

Srsly Risky Biz: Microsoft forgoes its secure future

Risky Bulletin

00:00

Other examples of cyber-enabled operations

Tom cites US grid disruptions in Venezuela and Russian attacks on Ukrainian infrastructure as contributing cyber uses.

Play episode from 17:27
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app