
Sign up to save your podcasts
Or
Link to blog post
This week’s Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group
Thanks to our show sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
All links and the video of this episode can be found on CISO Series.com
4.7
123123 ratings
Link to blog post
This week’s Cyber Security Headlines – Week in Review, is hosted by Rich Stroffolino with guest, Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group
Thanks to our show sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
All links and the video of this episode can be found on CISO Series.com
1,983 Listeners
365 Listeners
636 Listeners
366 Listeners
183 Listeners
1,009 Listeners
312 Listeners
415 Listeners
925 Listeners
7,909 Listeners
166 Listeners
189 Listeners
314 Listeners
74 Listeners
43 Listeners