Influence operators fine-tuning AI to deceive targets
67% of government agencies claim confidence in adopting zero trust
CISA warns of urgent Citrix vulnerability
Huge thanks to today's episode sponsor, Veza
75% of breaches happen because of bad permissions. The problem is that you don’t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as “read-only” can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission—in every app—across your environment.
For the stories behind the headlines, head to CISOseries.com.