
Sign up to save your podcasts
Or


Ford says cars with WiFi vulnerability still safe to drive
Cyber Safety Review Board to analyze cloud security in wake of Microsoft hack
Knight ransomware distributed in fake TripAdvisor complaint emails
Huge thanks to today's episode sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
For the stories behind the headlines, head to CISOseries.com.
By CISO Series4.7
133133 ratings
Ford says cars with WiFi vulnerability still safe to drive
Cyber Safety Review Board to analyze cloud security in wake of Microsoft hack
Knight ransomware distributed in fake TripAdvisor complaint emails
Huge thanks to today's episode sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
For the stories behind the headlines, head to CISOseries.com.

186 Listeners

2,009 Listeners

1,646 Listeners

372 Listeners

372 Listeners

651 Listeners

1,020 Listeners

319 Listeners

416 Listeners

8,061 Listeners

179 Listeners

314 Listeners

189 Listeners

74 Listeners

5 Listeners