PODCASTS

BTS #35 - The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley

Eclypsium presents Below The Surface text on top of ocean waves

Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment.

Show Notes

Subscribe