
Sign up to save your podcasts
Or


This week, Ben and Dave discuss the ongoing controversy surrounding Grok and its ability to generate nonconsensual nude images, raising fresh concerns about AI safeguards, consent, and accountability, before turning to a conversation with Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, who breaks down the Cybersecurity Information Sharing Act of 2015 (CISA).
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.
Links to today's stories:
Get the weekly Caveat Briefing delivered to your inbox.
Like what you heard? Be sure to check out and subscribe to our Caveat Briefing, a weekly newsletter available exclusively to N2K Pro members on N2K CyberWire's website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more.
This week’s Caveat Briefing covers India’s proposed smartphone security rules that would require manufacturers like Apple and Samsung to share source code for government review, impose strict permission controls, mandate malware scanning and long-term log retention, and limit how devices can be updated or downgraded. Tech companies and industry groups are pushing back, warning the measures are impractical, lack global precedent, could harm performance and battery life, and may delay critical security updates that protect users. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories.
Got a question you'd like us to answer on our show? You can send your audio file to [email protected]. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices
By N2K Networks4.8
9393 ratings
This week, Ben and Dave discuss the ongoing controversy surrounding Grok and its ability to generate nonconsensual nude images, raising fresh concerns about AI safeguards, consent, and accountability, before turning to a conversation with Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, who breaks down the Cybersecurity Information Sharing Act of 2015 (CISA).
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.
Links to today's stories:
Get the weekly Caveat Briefing delivered to your inbox.
Like what you heard? Be sure to check out and subscribe to our Caveat Briefing, a weekly newsletter available exclusively to N2K Pro members on N2K CyberWire's website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more.
This week’s Caveat Briefing covers India’s proposed smartphone security rules that would require manufacturers like Apple and Samsung to share source code for government review, impose strict permission controls, mandate malware scanning and long-term log retention, and limit how devices can be updated or downgraded. Tech companies and industry groups are pushing back, warning the measures are impractical, lack global precedent, could harm performance and battery life, and may delay critical security updates that protect users. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories.
Got a question you'd like us to answer on our show? You can send your audio file to [email protected]. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices

190 Listeners

6,023 Listeners

370 Listeners

373 Listeners

648 Listeners

1,033 Listeners

321 Listeners

423 Listeners

8,116 Listeners

178 Listeners

317 Listeners

191 Listeners

74 Listeners

138 Listeners

44 Listeners