
“McDonald’s Used ‘123456’ as a Password: A GRC Failure That Exposed 64 Million Job Applicants”
Échec de l'ajout au panier.
Veuillez réessayer plus tard
Échec de l'ajout à la liste d'envies.
Veuillez réessayer plus tard
Échec de la suppression de la liste d’envies.
Veuillez réessayer plus tard
Échec du suivi du balado
Ne plus suivre le balado a échoué
-
Narrateur(s):
-
Auteur(s):
À propos de cet audio
- What IDOR (Insecure Direct Object Reference) vulnerabilities are and how they’re exploited
- What frameworks like NIST and ISO 27001 would’ve required in this scenario
- What tools and policies could’ve blocked the breach
- What legal and regulatory consequences McDonald’s and its AI vendor might now face
- Why this isn’t just a “tech problem,” but a total GRC failure
💼 Want to Break Into GRC or Level Up in Cybersecurity? Whether you’re just starting your journey in governance, risk, and compliance—or you're ready to transition into six-figure cybersecurity consulting roles—I strongly recommend enrolling in the GRC Mastery Course by UnixGuy. This industry-leading program teaches you how to:
- Master frameworks like NIST, ISO, SOC 2, GDPR, HIPAA
- Run real-world risk assessments, audits, and vendor reviews
- Deliver client-ready reports and career-winning interviews
- Launch a full-time or consulting GRC career—even without a tech background
👉 https://grcmastery.teachable.com/courses/cyber-security-consulting-grc?affcode=1703194_rhsjeqin
Become a supporter of this podcast: https://www.spreaker.com/podcast/secure-governance--6683442/support.
Ce que les auditeurs disent de “McDonald’s Used ‘123456’ as a Password: A GRC Failure That Exposed 64 Million Job Applicants”
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
Il n'y a pas encore de critiques pour ce titre.