Risky Business Features cover image

What to do about North Korean remote workers

Risky Business Features

00:00

How the Fake IT Worker Scheme Operates

Brad outlines the fraud chain: fake identities, bribed verifiers, laptop farms, IP-KVMs and multi-person operations.

Play episode from 05:17
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app