Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

Privacy nightmare or useful tool?

Privacy nightmare or useful tool?

FromCyberWire Daily


Privacy nightmare or useful tool?

FromCyberWire Daily

ratings:
Length:
32 minutes
Released:
May 22, 2024
Format:
Podcast episode

Description

Some say Microsoft’s Recall should be. A breach of a Texas healthcare provided affects over four hundred thousand. Police in the Philippines shut down services following a breach. Ivanti patches multiple products. GitHub fixes a critical authentication bypass vulnerability. Researchers discover critical vulnerabilities in Honeywell’s ControlEdge Unit Operations Controller. The DoD releases their Cybersecurity Reciprocity Playbook. Hackers leak a database with millions of Americans’ criminal records. Mastercard speeds fraud detection with AI. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 5: Identity and Access Management. Remembering a computing visionary. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Joe and Sam dive into Domain 5: Identity and Access Management (IAM) and tackle a question together about biometric configuration. Try the question yourself before listening to the discussion!
You are configuring a biometric hand scanner to secure your data center. Which of the following practices is BEST to follow?

Decrease the reader sensitivity

Increase the FAR

Decrease the FRR

Increase the reader sensitivity


Selected Reading
UK watchdog looking into Microsoft AI taking screenshots (BBC)
How the new Microsoft Recall feature fundamentally undermines Windows security (DoublePulsar)
CentroMed Confirms Data Breach Affecting an Estimated 400k | Console and Associates, P.C. (JDSupra)
PNP suspends online services amid data breach probe (Philippine News Agency)
Ivanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager (SecurityWeek)
Critical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server (Heimdal Security)
Critical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution (SecurityWeek)
DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency (Industrial Cyber)
Criminal record database of millions of Americans dumped online (Malwarebytes)
Mastercard Doubles Speed of Fraud Detection with Generative AI (Infosecurity Magazine)
Gordon Bell, Legendary Designer of Computers, Dies at 89 (Gizmodo) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Released:
May 22, 2024
Format:
Podcast episode