Listen

Description

Influence operators fine-tuning AI to deceive targets

67% of government agencies claim confidence in adopting zero trust

CISA warns of urgent Citrix vulnerability

Huge thanks to today's episode sponsor, Veza

75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.

For the stories behind the headlines, head to CISOseries.com.