PLAY PODCASTS
Incognito settlement, hallucinated software, phone protocols vulnerable

Incognito settlement, hallucinated software, phone protocols vulnerable

Cybersecurity Headlines · CISO Series

April 2, 20246m 48s

Audio is streamed directly from the publisher (traffic.libsyn.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Google to delete Incognito tracking data

Hallucinated software packages as a security vulnerability

FCC investigating phone infrastructure security

Thanks to today's episode sponsor, Vanta

The average security pro spends nearly a full workday every week just on compliance.

With Vanta, you can automate compliance for in-demand frameworks like SOC 2, ISO 27001, and HIPAA.

Even more, Vanta's market-leading Trust Management Platform enables you to unify security program management with a built-in risk register and reporting, and streamline security reviews with AI-powered security questionnaires.

Over 7,000 fast-growing companies like Atlassian, Flo Health, and Quora use Vanta to manage risk and prove security in real time.

Watch Vanta's on-demand demo at vanta.com/ciso to learn more.