Listen "The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35"
Episode Synopsis
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them! Resource: https://cisa.gov/kev Show Notes: https://securityweekly.com/bts-35
More episodes of the podcast Below the Surface (Audio) - The Supply Chain Security Podcast
HybridPetya and UEFI Threats - BTS #60
22/09/2025
Exploit Marketplaces - BTS #59
10/09/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.