Paul's Security Weekly (Video)

The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - PSW #843


Listen Later

Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment.

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!

Show Notes: https://securityweekly.com/psw-843

...more
View all episodesView all episodes
Download on the App Store

Paul's Security Weekly (Video)By Security Weekly Productions

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like Paul's Security Weekly (Video)

View all
Security Now (Audio) by TWiT

Security Now (Audio)

2,009 Listeners

MacBreak Weekly (Video) by TWiT

MacBreak Weekly (Video)

364 Listeners

Security Now (Video) by TWiT

Security Now (Video)

148 Listeners

RunAs Radio by Richard Campbell

RunAs Radio

83 Listeners

Windows Weekly (Video) by TWiT

Windows Weekly (Video)

80 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

651 Listeners

Security Weekly News (Video) by Security Weekly Productions

Security Weekly News (Video)

5 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,090 Listeners

First Ring Daily by Paul Thurrott and Brad Sams

First Ring Daily

51 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

Talkin' Bout [Infosec] News by Black Hills Information Security

Talkin' Bout [Infosec] News

94 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

139 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

167 Listeners