
Sign up to save your podcasts
Or


Influence operators fine-tuning AI to deceive targets
67% of government agencies claim confidence in adopting zero trust
CISA warns of urgent Citrix vulnerability
Huge thanks to today's episode sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
For the stories behind the headlines, head to CISOseries.com.
By CISO Series4.7
133133 ratings
Influence operators fine-tuning AI to deceive targets
67% of government agencies claim confidence in adopting zero trust
CISA warns of urgent Citrix vulnerability
Huge thanks to today's episode sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
For the stories behind the headlines, head to CISOseries.com.

187 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

418 Listeners

8,077 Listeners

175 Listeners

315 Listeners

195 Listeners

73 Listeners

9 Listeners