5 episodes

Cybersecurity shouldn’t be a black box. Security Science aims to demystify cybersecurity with education combined with a dose of entertainment. We will tap a mix of experts to tackle the gamut of security topics - from the (mis)use of AI to deep analysis of specific vulnerabilities - grounding out each episode with measurable outcomes or joking around when there is a lack thereof.

Security Science Dan Mellinger

    • Technology
    • 5.0 • 10 Ratings

Cybersecurity shouldn’t be a black box. Security Science aims to demystify cybersecurity with education combined with a dose of entertainment. We will tap a mix of experts to tackle the gamut of security topics - from the (mis)use of AI to deep analysis of specific vulnerabilities - grounding out each episode with measurable outcomes or joking around when there is a lack thereof.

    Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

    Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

    The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.

    • 49 min
    Intrigue In Discovery and Digital Fingerprinting

    Intrigue In Discovery and Digital Fingerprinting

    Want more detail than Shodan queries? Need to figure out which devices have that new critical vuln and are exposed to the internet? Creator of Intrigue.io, Jcran discusses his creation and touches on the topics of digital fingerprinting and discovery tools.

    • 16 min
    Risk, Measured: Components of Cyber Risk

    Risk, Measured: Components of Cyber Risk

    The first episode in a Security Science mini-series called Risk, Measured - Kenna's Chief Data Scientist, Michael Roytman discusses the theory and components used to measure risk.

    • 28 min
    Building Zero Trust is Hard

    Building Zero Trust is Hard

    Recorded during the early days of the pandemic in 2020, Covid-19 thrust the concept of Zero Trust architectures into the security mainstream. Researcher, Builder, Hacker, Traveler, and Kenna's head of Security and Compliance, Jerry Gamblin discusses Zero Trust and the realities of the work required to truly adopt the architecture, probably bursting a few bubbles along the way.

    • 26 min
    A Brief History of Vulnerability Management

    A Brief History of Vulnerability Management

    In the very first episode of Security Science the Father of Risk-Based Vulnerability Management, Ed Bellis walks us through the history of Vulnerability Management. From the dark times before the CVE list and open-source scanners to the capabilities of today's best performing vulnerability management programs.

    • 42 min

Customer Reviews

5.0 out of 5
10 Ratings

10 Ratings

latonya starks ,

Wow.

Mike roytman's episode totally changed the way I think about vulnerabilities. Interesting to apply that in other contexts. Will stay tuned!

akioog ,

A Candid podcast for an ever growing market and space

I love how Ed and the team break down the importance of tools that help reduce organizations risk. An ever important need for companies just became a whole lot more interesting listening to the foundation on how Kenna was created!

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
TED Radio Hour
NPR
Dwarkesh Podcast
Dwarkesh Patel
Hard Fork
The New York Times