
Sign up to save your podcasts
Or
Link to blog post
This week’s Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group
Thanks to our show sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
All links and the video of this episode can be found on CISO Series.com
4.7
110110 ratings
Link to blog post
This week’s Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group
Thanks to our show sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
All links and the video of this episode can be found on CISO Series.com
1,962 Listeners
362 Listeners
632 Listeners
370 Listeners
177 Listeners
1,009 Listeners
314 Listeners
389 Listeners
925 Listeners
7,811 Listeners
161 Listeners
188 Listeners
312 Listeners
76 Listeners
33 Listeners