Artwork

محتوای ارائه شده توسط Big Pond Podcasts and MSP Radio. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Big Pond Podcasts and MSP Radio یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

NPD Massive Data Breach, Pentagon's CMMC Rules, Apple Opens NFC, and Ransomware Surge

8:55
 
اشتراک گذاری
 

Manage episode 435258110 series 2555839
محتوای ارائه شده توسط Big Pond Podcasts and MSP Radio. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Big Pond Podcasts and MSP Radio یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

A massive data breach at National Public Data exposed billions of records and raised concerns about data aggregation risks. The breach, believed to be caused by a third-party hacker, leaked personal information like names and social security numbers, prompting individuals to monitor their credit reports for any suspicious activity.

The second topic covers vulnerabilities found in Microsoft Azure's AI Health Bot service, which could allow for privilege escalation and access to cross-tenant resources. This highlights the importance of secure development practices in AI, especially in sectors like healthcare that are prime targets for cybercriminals. Additionally, a new ransomware group called Hunters International is targeting IT workers with a malware called Sharp Rhino, posing significant risks to organizations.

The Pentagon has proposed CMMC rules for contractors, incorporating Cybersecurity Maturity Model Certification requirements into the contracting process. Contractors will need to self-assess or obtain third-party certification based on data sensitivity, with compliance required at the time of contract award. ConnectWise has committed to assisting providers in achieving CMMC Level 2 compliance by 2025, emphasizing the need for coordination between providers and vendors in meeting compliance standards.

Lastly, Apple has opened NFC access to third-party developers in iOS 18.1, allowing them to utilize the iPhone's secure element for various applications like payments, transit fares, and IDs. This decision follows a legal agreement with European commissioners to comply with EU regulations. By expanding NFC technology on its devices, Apple is creating new opportunities for developers to deliver solutions to customers, enhancing the device's functionality and potential use cases.

Three things to know today

00:00 Massive Data Breach at National Public Data Exposes Billions of Records, Highlights Risks of Data Aggregation

04:32 Pentagon Proposes CMMC Rules for Contractors; ConnectWise Supports MSPs in Achieving Compliance

06:20 Apple Complies with EU Regulations, Grants NFC Secure Element Access to Developers in iOS 18.1

Supported by: https://trinitycyber.com/msp4/

All our Sponsors: https://businessof.tech/sponsors/

Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/

Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/

Support the show on Patreon: https://patreon.com/mspradio/

Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech

Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com

Follow us on:

LinkedIn: https://www.linkedin.com/company/28908079/

YouTube: https://youtube.com/mspradio/

Facebook: https://www.facebook.com/mspradionews/

Instagram: https://www.instagram.com/mspradio/

TikTok: https://www.tiktok.com/@businessoftech

Bluesky: https://bsky.app/profile/businessoftech.bsky.social

  continue reading

1457 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 435258110 series 2555839
محتوای ارائه شده توسط Big Pond Podcasts and MSP Radio. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Big Pond Podcasts and MSP Radio یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

A massive data breach at National Public Data exposed billions of records and raised concerns about data aggregation risks. The breach, believed to be caused by a third-party hacker, leaked personal information like names and social security numbers, prompting individuals to monitor their credit reports for any suspicious activity.

The second topic covers vulnerabilities found in Microsoft Azure's AI Health Bot service, which could allow for privilege escalation and access to cross-tenant resources. This highlights the importance of secure development practices in AI, especially in sectors like healthcare that are prime targets for cybercriminals. Additionally, a new ransomware group called Hunters International is targeting IT workers with a malware called Sharp Rhino, posing significant risks to organizations.

The Pentagon has proposed CMMC rules for contractors, incorporating Cybersecurity Maturity Model Certification requirements into the contracting process. Contractors will need to self-assess or obtain third-party certification based on data sensitivity, with compliance required at the time of contract award. ConnectWise has committed to assisting providers in achieving CMMC Level 2 compliance by 2025, emphasizing the need for coordination between providers and vendors in meeting compliance standards.

Lastly, Apple has opened NFC access to third-party developers in iOS 18.1, allowing them to utilize the iPhone's secure element for various applications like payments, transit fares, and IDs. This decision follows a legal agreement with European commissioners to comply with EU regulations. By expanding NFC technology on its devices, Apple is creating new opportunities for developers to deliver solutions to customers, enhancing the device's functionality and potential use cases.

Three things to know today

00:00 Massive Data Breach at National Public Data Exposes Billions of Records, Highlights Risks of Data Aggregation

04:32 Pentagon Proposes CMMC Rules for Contractors; ConnectWise Supports MSPs in Achieving Compliance

06:20 Apple Complies with EU Regulations, Grants NFC Secure Element Access to Developers in iOS 18.1

Supported by: https://trinitycyber.com/msp4/

All our Sponsors: https://businessof.tech/sponsors/

Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/

Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/

Support the show on Patreon: https://patreon.com/mspradio/

Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech

Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com

Follow us on:

LinkedIn: https://www.linkedin.com/company/28908079/

YouTube: https://youtube.com/mspradio/

Facebook: https://www.facebook.com/mspradionews/

Instagram: https://www.instagram.com/mspradio/

TikTok: https://www.tiktok.com/@businessoftech

Bluesky: https://bsky.app/profile/businessoftech.bsky.social

  continue reading

1457 قسمت

Semua episod

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع