logo
episode-header-image
May 2020
21m 3s

Fingerprint authentication is not comple...

N2K Networks
About this episode
Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough t ... Show More
Up next
Yesterday
Leaky chats collide with shifting security standards.
A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President’s NSA pick champions section 702. France looks to reduce ... Show More
25m 16s
Jan 29
Proxy wars and open doors.
Google dismantles a huge residential proxy network. Did the FBI take down the notorious RAMP cybercrime forum? A long running North Korea backed cyber operation has splintered into three specialized threat groups. U.S. military cyber operators carried out a covert operation to di ... Show More
30m 24s
Jan 28
When the Director uses the wrong chat window.
CISA’s interim director uploaded sensitive government material into the public version of ChatGPT. The cyberattack on Poland’s power grid compromised roughly 30 energy facilities. The EU and India sign a new partnership that includes expanded cyber cooperation. Meta rolls out enh ... Show More
25m 6s
Recommended Episodes
Apr 2021
TechStuff Classic: Biometrics: Digital Fingerprinting
How has the Digital Age improved the centuries-old practice of fingerprinting? We explore the history of fingerprint tech and explain how modern scanners use optics, capacitance, heat and ultrasound to create prints that are harder than ever to hack. Learn more about your ad-choi ... Show More
33m 49s
Aug 2021
The Privacy Paradox: How Digital IDs are Empowering Consumers to Take Control of their Digital Existence
<p>Standing in line at an airport is a bad experience. Shuffling through your wallet once you reach the front of that line only to realize you don’t have your driver’s license, that’s a worse experience. From boarding airplanes to purchasing alcohol, the technology that enables d ... Show More
43m 10s
Jun 2019
Is Your Password Secure? Probably Not
For decades, experts have known that a simple alphanumeric password isn't enough to secure our identities online, but nothing has changed. In this episode, we’re talking to Wendy Nather, a veteran of the infosec world who knows a thing or two about identity and authentication. Se ... Show More
19m 34s
Sep 2021
1722: NOK NOK - Talking Metal Payment Cards and Passwordless Authentication
<p>According to ABI Research, the market for metal payment cards is expanding rapidly and is expected to reach 90 million cards (cumulative) by 2025. In addition, CompoSecure, the category leader in metal payment cards, and Nok Nok Labs, the co-founder of the FIDO Alliance and le ... Show More
30m 11s
May 2022
117: Daniel the Paladin
<p>Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness.</p><p><br></p><p>Sponsors</p><p>Support for this show comes from Keeper Security. Keeper Security’s is a ... Show More
1h 9m
Dec 2022
131: Welcome to Video
<p>Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child sexual abuse darkweb website.</p><p><br></p><p>This story is part of Andy’s new bo ... Show More
1h 8m
Dec 2021
Keeping Security Simple with Johanna Baum, the CEO and Founder of S3 (Strategic Security Solutions)
<p>There is a lot of conversation among IT security leaders about engaging the workforce in order to mitigate threats. But how do security professionals actually win people over to their side? Many employees are willing to comply but what can be done to really get through to thos ... Show More
41 m