Here are this week's picks for must-watch episodes! |
|
|
| The Known Exploited Vulnerability catalogue, aka the KEV – Tod Beardsley |
Below The Surface Podcast Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment. |
|
|
| Cybersecurity’s Love Affair with Distractions – Fred Wilmot |
Enterprise Security Weekly Why do we keep thinking that the next vendor offering is going to solve all our problems? In this interview, we talk with Fred Wilmot about the hard work of building effective processes and resilient architectures that will actually yield reductions in risk and detection/response capabilities that actually work. |
|
|
| Identity Security Posture Management – Dor Fledel |
Business Security Weekly If you're struggling with securing your identities, don't miss this interview. From numerous disparate identity systems to a proliferation is SaaS application usage, Dor explains why Identity SecurityPosture Management is critical component to identify vulnerabilities, prioritize risks, and streamline remediation. |
|
|
Follow us on social media to join our growing community. |
|
|
|