The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35

Below the Surface (Video) - The Supply Chain Security Podcast

Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment.

This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!

Resource: https://cisa.gov/kev

Show Notes: https://securityweekly.com/bts-35

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign-in or sign-up to follow shows, save episodes and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada