
Sign up to save your podcasts
Or
Influence operators fine-tuning AI to deceive targets
67% of government agencies claim confidence in adopting zero trust
CISA warns of urgent Citrix vulnerability
Huge thanks to today's episode sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
For the stories behind the headlines, head to CISOseries.com.
4.7
110110 ratings
Influence operators fine-tuning AI to deceive targets
67% of government agencies claim confidence in adopting zero trust
CISA warns of urgent Citrix vulnerability
Huge thanks to today's episode sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
For the stories behind the headlines, head to CISOseries.com.
1,962 Listeners
362 Listeners
632 Listeners
370 Listeners
177 Listeners
1,009 Listeners
314 Listeners
389 Listeners
925 Listeners
7,811 Listeners
161 Listeners
188 Listeners
312 Listeners
76 Listeners
33 Listeners