Incognito settlement, hallucinated software, phone protocols vulnerable - podcast episode cover

Incognito settlement, hallucinated software, phone protocols vulnerable

Apr 02, 20247 min
--:--
--:--
Listen in podcast apps:

Episode description

Google to delete Incognito tracking data

Hallucinated software packages as a security vulnerability

FCC investigating phone infrastructure security

Thanks to today's episode sponsor, Vanta

The average security pro spends nearly a full workday every week just on compliance.

With Vanta, you can automate compliance for in-demand frameworks like SOC 2, ISO 27001, and HIPAA.

Even more, Vanta’s market-leading Trust Management Platform enables you to unify security program management with a built-in risk register and reporting, and streamline security reviews with AI-powered security questionnaires.

Over 7,000 fast-growing companies like Atlassian, Flo Health, and Quora use Vanta to manage risk and prove security in real time.

Watch Vanta’s on-demand demo at vanta.com/ciso to learn more.

Incognito settlement, hallucinated software, phone protocols vulnerable | Cyber Security Headlines podcast - Listen or read transcript on Metacast