4.6 • 1K Ratings
🗓️ 22 May 2024
⏱️ 26 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. Some say Microsoft's recall should be. A breach of a Texas health care provider affects over 400,000. |
0:25.0 | Police in the Philippines shut down services following a breach. |
0:28.0 | Ivante patches multiple products. |
0:31.0 | GitHub fixes a critical authentication bypass vulnerability. |
0:35.0 | Researchers discover critical vulnerabilities in Honeywell's Control Edge Unit Operations |
0:38.9 | controller. |
0:40.1 | The DoD releases their Cybersecurity Reciprocity Playbook. |
0:44.4 | Packers leak a database with millions of Americans criminal records. |
0:48.1 | Mastercard speeds fraud detection with AI. |
0:51.5 | In our learning layer segment, |
0:53.0 | Post-Sam Meisenberg and Joe Kerrigan continue their discussion of Joe's |
0:57.0 | CISSP certification journey, diving into domain 5, identity and access management, |
1:03.6 | and remembering a computing visionary. It's Wednesday, May 22nd, 2024. I'm Dave Bitner, and this is your cyberwire Intel briefing. Thanks for joining us once again here today. It is great to have you with us. |
1:44.0 | The UK's Information Commissioners Office is questioning Microsoft about its new feature, |
1:49.7 | Recall, which takes frequent screenshots on new co-pilot plus PCs. Privacy advocates are |
1:57.4 | concerned about potential risks calling it a privacy nightmare. Microsoft states that recall is optional, keeps data local, and is designed with privacy in mind. |
2:09.0 | Users can control what recall captures and private browsing on edge is excluded. |
2:15.0 | However, the I.C. |
2:17.0 | emphasizes the need for rigorous risk management assessments before product releases. |
2:22.0 | Recall allows users to search past activity, including files and browsing history, |
2:27.8 | by capturing screenshots every few seconds. |
2:31.3 | Critics warn this could deter people from accessing sensitive information. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.