A Chronological Journey Through Risk-Based Vuln Management

Jul 29, 2020
Dan Mellinger
Senior Director of Corporate Communications

Share with Your Network

Picking up where we left off on the history of vulnerability management, Ed Bellis walks us through the history of risk-based vulnerability management (RBVM) to current times and the near future.

People Mentioned In The Episode:
@adamshostack, @alexhutton, @anton_chuvakin, @apbarros, @benjamesedwards, @craiglawson, @jayjacobs, @mroytman, @oliverrochford, @PrateekBhajanka, @rybolov, @sasharomanosky, @wadebaker

If you have any feedback or want to be a guest on the podcast? DM me via Twitter @DTMellinger 

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.