
August 24th, 2020
Cybersecurity Headlines
00:00
Suspected Domains, Key Duplication, and Hiring a Diverse Staff
The chapter discusses suspicious domains related to voting and elections identified by DHS and researchers who have found a way to create duplicate keys by recording lock sounds. It also promotes a CISO series video chat on hiring a diverse staff for security improvement.
Play episode from 05:06
Transcript


