Computer Architecture Podcast cover image

Ep 8: Durable Security and Privacy-enhanced Computing with Dr. Todd Austin, University of Michigan

Computer Architecture Podcast

00:00

How to Get the Most Out of Your Security Numbers

Jm, jim laris: We have a heavy reliance on sofrnow for everything. And what you've just kind of described there is enabling any soffer anywhere to do its thing. The whole inner net is built on this idea that i give you my data, you monotize my data and provide me as free service for that data. Half of us had oursecurity numbers stolen in a single breach in 20 17,. the equifax breach, which was a runon runtime coation standard - 76 days they were able to exciltrate data from that. I read a very interesting statistic the other day. What fraction of american adults have had their s security numbers

Play episode from 15:52
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app