
Sign up to save your podcasts
Or


Link to blog post
This week's Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group
Thanks to our show sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
All links and the video of this episode can be found on CISO Series.com
By CISO Series4.7
133133 ratings
Link to blog post
This week's Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group
Thanks to our show sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don't know exactly WHO has access to WHAT data in your environment. For example, roles labeled as "read-only" can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
All links and the video of this episode can be found on CISO Series.com

188 Listeners

2,010 Listeners

1,653 Listeners

372 Listeners

372 Listeners

652 Listeners

1,025 Listeners

319 Listeners

419 Listeners

8,086 Listeners

178 Listeners

315 Listeners

194 Listeners

73 Listeners

9 Listeners