This Week Health

Don't forget to subscribe!

Drex dives into the growing risks of machine identities, how cybercriminals exploit them, and steps you can take to secure your environment. Drex also shares insights from TechCrunch's 2024 cybersecurity reflections and introduces his Top 24 Breaches of 2024 document.

Remember, Stay a Little Paranoid 

Subscribe: This Week Health

Twitter: This Week Health

LinkedIn: Week Health

Donate: Alex’s Lemonade Stand: Foundation for Childhood Cancer

Transcript

  This transcription is provided by artificial intelligence. We believe in technology but understand that even the smartest robots can sometimes get speech recognition wrong.

Hey everyone, I'm Drex and this is the Two Minute Drill. There's a lot of security stories in the news these days. A lot of sites to visit. A lot of alerts. It's a lot of reading, if you do it. And that's where I come in. I filter through dozens of feeds to find the most important stuff healthcare leaders need to know about cybersecurity, and that all goes into this micro podcast, The Two Minute Drill.

Three hot security stories, twice a week, and sometimes a little extra commentary sauce on the side, all in one easy to watch bite sized clip that's perfectly sized for sharing. Today's 2 Minute Drill is brought to you by Intraprise Health, a health catalyst company. It turns out you can reduce the time and effort needed for third party risk assessments by up to 50 percent using Enterprise Health's Blueprint Gen AI technology.

Security, compliance, and peace of mind. Find out more at Intraprise Health. com. Thanks for joining me today. Here's some stuff you might want to know about. You probably know by now that more than three quarters of all breaches can be traced back to stolen identities. Bad guys buy usernames and passwords off the dark web and then log into networks or applications of their choice.

And that's a problem with what we call human identities. Those are tied to people, but there's a next wave of identity problems that a recent survey shows. 88 percent of security leaders are worried about machine identities. One way to think about machine identities might be that they're little programs or tokens or certificates or service accounts that take specific actions as part of a workflow process.

They're usually behind the scenes. Most end users would never need to know specifically how machine identities work or even that they exist at all. But now you do, and cyber thugs are taking advantage of these machine identities more and more often. Part of the reason is the growing complexity of our environment, often tied to cloud computing and how those machine identities are tied to authentications across cloud providers or applications or your local data center.

Like anything else you're trying to secure, the first step is to know all the machine identities on your local and cloud environment and understand what they have permissions to do. There's two good articles about this challenge on the news site at ThisWeekHelp. com slash news. One other quick story.

t they didn't get to first in:breaches of:

Security, compliance, and peace of mind. It's the unified risk management approach that makes Enterprise Health and their blueprint technology. Different. Find out more at Intraprise Health. com. That's it for today's Two Minute Drill. Thanks for being here, and Happy New Year. I'll see you around campus.

2 Minute Drill is Sponsored By

Our Shows

Related Content

1 2 3 303
Healthcare Transformation Powered by Community

© Copyright 2024 Health Lyrics All rights reserved