19 avsnitt

A free podcast about cybersecurity, vulnerability management, and the CVE Program.

We Speak CVE CVE Program

    • Teknologi

A free podcast about cybersecurity, vulnerability management, and the CVE Program.

    Swimming in Vulns (or, Fun with CVE Data Analysis)

    Swimming in Vulns (or, Fun with CVE Data Analysis)

    Host Shannon Sabens of CrowdStrike chats with Benjamin Edwards and Sander Vinberg, both of Bitsight, about analyzing vulnerability data in the CVE List. This is a follow-on to their “CVE Is The Worst Vulnerability Framework (Except For All The Others)” talk at CVE/FIRST VulnCon 2024.
    Topics discussed include the types of vulnerabilities and vulnerability intelligence they reviewed and the different ways they approached the data; how CVE is a really good framework for compiling information about, and communicating effectively about, vulnerabilities; how increasing the number of CVE Numbering Authorities (CNAs) through federation has improved the quantity and quality of data produced by the program over time; how the overall quality of CVE List data will improve for the entire vulnerability management ecosystem as more CNAs include CVSS, CWE, CPE, etc., information when their CVE Records are published; and much, much, more! 
     

    • 43 min
    Meet the 3 New CVE Board Members

    Meet the 3 New CVE Board Members

    In this episode — recorded live at “CVE/FIRST VulnCon 2024” — CVE Board member and CVE podcast host Shannon Sabens of CrowdStrike chats with the three newest CVE Board members: Madison Oliver of GitHub Security Lab, Tod Beardsley of Austin Hackers Anonymous (AHA!), and MegaZone of F5 who joins as the new CVE Numbering Authority (CNA) Liaison to the Board.
    Topics include how and why each new member joined the board, the impact that participating in CVE Working Groups had on their decisions to become Board members, how federation and the ongoing addition of new CNA partners has significantly improved the CVE Program, how the program is voluntary, and how those who participate have the ability to make significant impacts in improving vulnerability management at an international level, and more.

    • 25 min
    CVE Records States and Tags

    CVE Records States and Tags

    Host Shannon Sabens speaks with Art Manion and Kent Landfield, all three of whom are CVE Board members and CVE Working Group (WG) chairs, about CVE Records.  Discussion topics include the CVE Record Lifecycle, the three “states” of CVE Records (RESERVED, PUBLISHED, and REJECTED), the current “tags” in use with CVE Records (EXCLUSIVELY-HOSTED-SERVICE; UNSUPPORTED-WHEN-ASSIGNED; and DISPUTED), the difference between the REJECTED state and the DISPUTED tag, how a DISPUTED tag can be temporary or indefinite, and much more. 

    • 33 min
    The Council of Roots

    The Council of Roots

    Learn how CVE Numbering Authority (CNA) partners—ranging from large to small organizations, proprietary and open-source products or projects, disparate business sectors, and different geographic locations—are overseen and supported within the CVE Program by “Top-Level Roots” and “Roots.” Topics include the roles and responsibilities of the two different types of Roots; how their work benefits the CNAs under their care; how they recruit new CNA partners, including suggestions for addressing upper management concerns if a CNA prospect organization is hesitant to partner as a CNA; how they work with and support their CNAs over time; how the “Council of Roots” works together to enhance and help improve the program overall; and much more. All current CVE Program Top-Level Roots and Roots are represented in this podcast.

    In addition to host Shannon Sabens of CrowdStrike, speakers include Julia Turkevich of the CISA Top-Level Root and CISA ICS Root, Dave Morse of the MITRE Top-Level Root, Cristian Cadenas Sarmiento of the INCIBE Root, Paul Dev of the Google Root, Tomo Ito of the JPCERT/CC Root, and Yogesh Mittal of the Red Hat Root.
    LINKS:
    Benefits of being a CNA partner How to become a CNA partner Partner onboarding process List of current CNA partners 

    • 48 min
    How the New CVE Record Format Will Benefit Consumers

    How the New CVE Record Format Will Benefit Consumers

    Shannon Sabens of CrowdStrike and Kent Landfield of Trellix, both of whom are CVE Board members and CVE Working Group chairs, speak about how the new CVE Record format — with its new structured data format and optional information fields — will benefit and provide enhanced value to consumers of CVE content moving forward. 
    Specific topics discussed include how the new CVE Record format will enable more complete vulnerability information to be captured early on in the advisory process and how that will benefit consumers; the ability for CVE content consumers to streamline and more easily automate their use of CVE Records because the data format is standardized and machine-readable; the automated creation and publication of CVE Records by CVE Numbering Authorities (currently, 320+ CNAs from 35+ countries!), which means more quality CVE Records can be produced at a faster pace than ever before for use by the worldwide community; and, for the ability of official CVE Program “Authorized Data Publishers (ADPs)” to enrich the content of already published CVE Records with additional risk scores, affected product lists, versions, references, translations, and so on, (learn more about ADPs in this CVE podcast).

    Vulnerability scoring methods for CVE Records are also discussed, including NVD’s use of CVSS, CISA’s Known Exploited Vulnerabilities (KEV) Catalog, and more.

    • 25 min
    Becoming A CNA—Myths versus Facts

    Becoming A CNA—Myths versus Facts

    Host Shannon Sabens of CrowdStrike chats with Julia Turkevich of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) about the myths and facts of partnering with the CVE Program as a CVE Numbering Authority (CNA).

    Truth and facts about the following myths are discussed:

    Myth #1:  Only a specific category of software vendors can become CNAs.
    Myth #2:  Organizations cannot leverage their existing vulnerability management and disclosure processes when they become a CNA.
    Myth #3:  The requirements for becoming a CNA are overwhelming and extensive.
    Myth #4:  A fee is required to become a CNA.
    Myth #5:  The CNA onboarding process is too complicated and time-consuming.
    Myth #6:  Organizations cannot choose the Top-Level Root or Root they want to work with.

    The purpose and overall structure of the CVE Program and CISA's role in recruiting and managing CNAs within its Top-Level Root scope of industrial control system (ICS) and operation technology (OT) are also discussed.

    LINKS:
    How to Become a CNACNA Onboarding Process OverviewCVE Program StructureCISA ICS Top-Level Root partner details pageList of CVE Program Partners

    • 22 min

Mest populära poddar inom Teknologi

Lex Fridman Podcast
Lex Fridman
Internetpionjärerna
Tele2
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
Elbilsveckan
Peter Esse & Christoffer Gullin
Darknet Diaries
Jack Rhysider

Du kanske också gillar

Risky Business
Patrick Gray
Malicious Life
Malicious Life
The 443 - Security Simplified
Secplicity
Cyber Work
Infosec