Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:02
You're listening to the CyberWire Network, powered
0:04
by N2K. With
0:12
over 8,000 threat hunters analyzing
0:14
over 65 trillion signals daily,
0:16
Microsoft works tirelessly with the
0:18
federal government to keep our
0:20
nation's data secure. This
0:23
30-year-plus partnership is driving mission innovation
0:25
that is secure by design. Whether
0:28
optimizing your existing defenses or tackling
0:31
advanced threats with AI, Microsoft gives
0:33
you the intelligence and the automation
0:35
you need to defend at mission
0:38
scale. Let's work together to
0:40
stay ahead of emerging threats and
0:42
secure your mission anywhere. Learn
0:44
more at aka.ms. That's aka.ms.
0:46
That's aka.ms. That's aka.ms. That's
0:49
aka.ms. That's aka.ms. That's aka.ms.
0:51
That's aka.ms. That's aka.ms.
0:54
That's aka.ms. That's aka.ms. That's aka.ms.
0:56
That's aka.ms. The
1:02
word is taint analysis. Spelled
1:09
T as in tarnish, A
1:12
as in adultery, I as
1:14
in infect, N as in
1:16
nasty, T as in trace and
1:18
analysis for study. Definition.
1:27
The process of software engineers
1:29
checking for the flow of
1:31
user input in application code
1:33
to determine if unanticipated input
1:35
can affect program execution in
1:37
malicious ways. Example
1:44
sentence. Text analysis is
1:46
a useful technique for a security audit
1:48
for an applications attack service. Origin
1:57
and context. All user
1:59
input can
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More