logo
episode-header-image
May 2020
21m 3s

Fingerprint authentication is not comple...

N2K Networks
About this episode
Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough t ... Show More
Up next
Yesterday
Europe clamps down on global hackers.
The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on s ... Show More
27m 16s
Yesterday
Mid season reflection with Kim Jones. [CISOP]
In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, un ... Show More
41m 27s
Mar 16
Watch out for cybercrime frequent flyers.
Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach. Microsoft issues a hotpatch. Malware turns up on Steam. Fileless attacks grow. Airline miles become cybercri ... Show More
25m 45s
Recommended Episodes
Apr 2021
TechStuff Classic: Biometrics: Digital Fingerprinting
How has the Digital Age improved the centuries-old practice of fingerprinting? We explore the history of fingerprint tech and explain how modern scanners use optics, capacitance, heat and ultrasound to create prints that are harder than ever to hack. Learn more about your ad-choi ... Show More
33m 49s
Aug 2021
The Privacy Paradox: How Digital IDs are Empowering Consumers to Take Control of their Digital Existence
<p>Standing in line at an airport is a bad experience. Shuffling through your wallet once you reach the front of that line only to realize you don’t have your driver’s license, that’s a worse experience. From boarding airplanes to purchasing alcohol, the technology that enables d ... Show More
43m 10s
Jun 2019
Is Your Password Secure? Probably Not
For decades, experts have known that a simple alphanumeric password isn't enough to secure our identities online, but nothing has changed. In this episode, we’re talking to Wendy Nather, a veteran of the infosec world who knows a thing or two about identity and authentication. Se ... Show More
19m 34s
Sep 2021
1722: NOK NOK - Talking Metal Payment Cards and Passwordless Authentication
<p>According to ABI Research, the market for metal payment cards is expanding rapidly and is expected to reach 90 million cards (cumulative) by 2025. In addition, CompoSecure, the category leader in metal payment cards, and Nok Nok Labs, the co-founder of the FIDO Alliance and le ... Show More
30m 11s
May 2022
117: Daniel the Paladin
<p>Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness.</p><p><br></p><p>Sponsors</p><p>Support for this show comes from Keeper Security. Keeper Security’s is a ... Show More
1h 9m
Dec 2022
131: Welcome to Video
<p>Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child sexual abuse darkweb website.</p><p><br></p><p>This story is part of Andy’s new bo ... Show More
1h 8m
Dec 2021
Keeping Security Simple with Johanna Baum, the CEO and Founder of S3 (Strategic Security Solutions)
<p>There is a lot of conversation among IT security leaders about engaging the workforce in order to mitigate threats. But how do security professionals actually win people over to their side? Many employees are willing to comply but what can be done to really get through to thos ... Show More
41 m