Below the Surface (Audio) - The Supply Chain Security Podcast

The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35


Listen Later

Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment.

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!

Resource: https://cisa.gov/kev

Show Notes: https://securityweekly.com/bts-35

...more
View all episodesView all episodes
Download on the App Store

Below the Surface (Audio) - The Supply Chain Security PodcastBy Eclypsium

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like Below the Surface (Audio) - The Supply Chain Security Podcast

View all
The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

228,750 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,004 Listeners

Security Weekly Podcast Network (Audio) by Security Weekly Productions

Security Weekly Podcast Network (Audio)

209 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

265 Listeners

Risky Business by Patrick Gray

Risky Business

374 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

637 Listeners

Destination Linux by TuxDigital Network

Destination Linux

89 Listeners

Smashing Security by Graham Cluley

Smashing Security

322 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,020 Listeners

Three Buddy Problem by Security Conversations

Three Buddy Problem

61 Listeners

The AI Daily Brief: Artificial Intelligence News and Analysis by Nathaniel Whittemore

The AI Daily Brief: Artificial Intelligence News and Analysis

586 Listeners

Untitled Linux Show (Audio) by TWiT

Untitled Linux Show (Audio)

1 Listeners