Podcast Episode Details

Back to Podcast Episodes
The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35

The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35



Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment.

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!

Resource: https://cisa.gov/kev

Show Notes: https://securityweekly.com/bts-35


Published on 1 year, 4 months ago






If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate