Privacy nightmare or useful tool?

Published: May 22, 2024, 8:10 p.m.

Some say Microsoft\u2019s Recall should be. A breach of a Texas healthcare provided affects over four hundred thousand. Police in the Philippines shut down services following a breach. Ivanti patches multiple products. GitHub fixes a critical authentication bypass vulnerability. Researchers discover critical vulnerabilities in Honeywell\u2019s ControlEdge Unit Operations Controller. The DoD releases their Cybersecurity Reciprocity Playbook. Hackers leak a database with millions of Americans\u2019 criminal records. Mastercard speeds fraud detection with AI. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 5: Identity and Access Management. Remembering a computing visionary.\xa0\nOur 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.\nMiss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you\u2019ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.\n\nLearning Layer\nOn our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K\u2019s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Joe and Sam dive into Domain 5: Identity and Access Management (IAM) and tackle a question together about biometric configuration. Try the question yourself before listening to the discussion!\nYou are configuring a biometric hand scanner to secure your data center. Which of the following practices is BEST to follow?\n\nDecrease the reader sensitivity\n\nIncrease the FAR\n\nDecrease the FRR\n\nIncrease the reader sensitivity\n\n\nSelected Reading\nUK watchdog looking into Microsoft AI taking screenshots (BBC)\n\tHow the new Microsoft Recall feature fundamentally undermines Windows security (DoublePulsar)\nCentroMed Confirms Data Breach Affecting an Estimated 400k | Console and Associates, P.C. (JDSupra)\nPNP suspends online services amid data breach probe (Philippine News Agency)\nIvanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager (SecurityWeek)\nCritical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server (Heimdal Security)\nCritical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution (SecurityWeek)\nDoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency (Industrial Cyber)\nCriminal record database of millions of Americans dumped online (Malwarebytes)\nMastercard Doubles Speed of Fraud Detection with Generative AI (Infosecurity Magazine)\nGordon Bell, Legendary Designer of Computers, Dies at 89 (Gizmodo)\xa0\n\nShare your feedback.\nWe want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.\xa0\n\nWant to hear your company in the show?\nYou too can reach the most influential leaders and operators in the industry. Here\u2019s our media kit. Contact us at cyberwire@n2k.com to request more info.\nThe CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. \xa9 N2K Networks, Inc.\nLearn more about your ad choices. Visit megaphone.fm/adchoices