32 episodes

Cybersecurity shouldn’t be a black box. Security Science aims to demystify cybersecurity with education combined with a dose of entertainment. We will tap a mix of experts to tackle the gamut of security topics - from the (mis)use of AI to deep analysis of specific vulnerabilities - grounding out each episode with measurable outcomes or joking around when there is a lack thereof. New episodes every Wednesday.

Security Scienc‪e‬ Kenna Security

    • Technology
    • 5.0 • 8 Ratings

Cybersecurity shouldn’t be a black box. Security Science aims to demystify cybersecurity with education combined with a dose of entertainment. We will tap a mix of experts to tackle the gamut of security topics - from the (mis)use of AI to deep analysis of specific vulnerabilities - grounding out each episode with measurable outcomes or joking around when there is a lack thereof. New episodes every Wednesday.

    Counting CVEs

    Counting CVEs

    Dive into a quick history of the CVE List as we kick off a quarterly update that tracks the progress of new CVEs issued.

    • 22 min
    Vulnerability Disclosure and Responsible Exposure

    Vulnerability Disclosure and Responsible Exposure

    We discuss and add some quantifiable data to a hot-button issue in the cybersecurity industry: responsible disclosure of vulnerabilities and exploits.

    • 34 min
    Risk, Measured: 7 Characteristics of Good Metrics

    Risk, Measured: 7 Characteristics of Good Metrics

    Continuing our miniseries into Risk, Measured: we go back to statistics class and discuss some of the characteristics of good metrics to help people understand what you should be looking for when you want to meaningfully quantify cybersecurity phenomena, program performance, or anything really.

    • 45 min
    Why Vulnerability Scores Can’t Be Looked At In A Vacuum

    Why Vulnerability Scores Can’t Be Looked At In A Vacuum

    Sometimes a number is just a number. Context - the information and environment around the number - is what really matters. We discuss how this concept holds especially true in vulnerability management and risk scoring.

    • 22 min
    More Blue Team Voices

    More Blue Team Voices

    We discuss the general lack of defensive perspectives in cybersecurity media and culture, how that impacts perceptions and decision making, and what we can do about it.

    • 30 min
    Risk, Measured: Power Laws and Security

    Risk, Measured: Power Laws and Security

    We discuss the application of power law distributions in cybersecurity.

    • 33 min

Customer Reviews

5.0 out of 5
8 Ratings

8 Ratings

latonya starks ,

Wow.

Mike roytman's episode totally changed the way I think about vulnerabilities. Interesting to apply that in other contexts. Will stay tuned!

akioog ,

A Candid podcast for an ever growing market and space

I love how Ed and the team break down the importance of tools that help reduce organizations risk. An ever important need for companies just became a whole lot more interesting listening to the foundation on how Kenna was created!

Top Podcasts In Technology