Paul's Security Weekly (Video)

The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - PSW #843


Listen Later

Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment.

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!

Show Notes: https://securityweekly.com/psw-843

...more
View all episodesView all episodes
Download on the App Store

Paul's Security Weekly (Video)By Security Weekly Productions

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like Paul's Security Weekly (Video)

View all
Security Now (Audio) by TWiT

Security Now (Audio)

2,010 Listeners

MacBreak Weekly (Video) by TWiT

MacBreak Weekly (Video)

355 Listeners

Security Now (Video) by TWiT

Security Now (Video)

148 Listeners

RunAs Radio by Richard Campbell

RunAs Radio

83 Listeners

Windows Weekly (Video) by TWiT

Windows Weekly (Video)

79 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

654 Listeners

Security Weekly News (Video) by Security Weekly Productions

Security Weekly News (Video)

5 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,044 Listeners

First Ring Daily by Paul Thurrott and Brad Sams

First Ring Daily

51 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

Talkin' Bout [Infosec] News by Black Hills Information Security

Talkin' Bout [Infosec] News

92 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

169 Listeners