
Week in Review: UK Health data shared, SSH keys vulnerable
Cybersecurity Headlines
00:00
Complexity of Cybersecurity Regulations
The speakers discuss the complexity of the notification rules and conflicting regulations in cybersecurity, stressing the need for a designated responsibility. They also mention Intel fixing a high severity CPU bug and the vulnerability of computers, raising concerns about programmers leaving authentication credentials in publicly accessible code.
Play episode from 14:09
Transcript


