5 episodes

Cybersecurity shouldn’t be a black box. Security Science aims to demystify cybersecurity with education combined with a dose of entertainment. We will tap a mix of experts to tackle the gamut of security topics - from the (mis)use of AI to deep analysis of specific vulnerabilities - grounding out each episode with measurable outcomes or joking around when there is a lack thereof.

Security Science Dan Mellinger

    • Technology

Cybersecurity shouldn’t be a black box. Security Science aims to demystify cybersecurity with education combined with a dose of entertainment. We will tap a mix of experts to tackle the gamut of security topics - from the (mis)use of AI to deep analysis of specific vulnerabilities - grounding out each episode with measurable outcomes or joking around when there is a lack thereof.

    Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

    Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

    The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.

    • 49 min
    Intrigue In Discovery and Digital Fingerprinting

    Intrigue In Discovery and Digital Fingerprinting

    Want more detail than Shodan queries? Need to figure out which devices have that new critical vuln and are exposed to the internet? Creator of Intrigue.io, Jcran discusses his creation and touches on the topics of digital fingerprinting and discovery tools.

    • 16 min
    Risk, Measured: Components of Cyber Risk

    Risk, Measured: Components of Cyber Risk

    The first episode in a Security Science mini-series called Risk, Measured - Kenna's Chief Data Scientist, Michael Roytman discusses the theory and components used to measure risk.

    • 28 min
    Building Zero Trust is Hard

    Building Zero Trust is Hard

    Recorded during the early days of the pandemic in 2020, Covid-19 thrust the concept of Zero Trust architectures into the security mainstream. Researcher, Builder, Hacker, Traveler, and Kenna's head of Security and Compliance, Jerry Gamblin discusses Zero Trust and the realities of the work required to truly adopt the architecture, probably bursting a few bubbles along the way.

    • 26 min
    A Brief History of Vulnerability Management

    A Brief History of Vulnerability Management

    In the very first episode of Security Science the Father of Risk-Based Vulnerability Management, Ed Bellis walks us through the history of Vulnerability Management. From the dark times before the CVE list and open-source scanners to the capabilities of today's best performing vulnerability management programs.

    • 42 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
Waveform: The MKBHD Podcast
Vox Media Podcast Network
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
X-Raid Podcast
De Zee X
TED Radio Hour
NPR
Tech Lead Journal
Henry Suryawirawan