About KEV
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment.
https://securityweeklytv.libsyn.com/the-known-exploited-vulnerability-catalogue-aka-the-kev-tod-beardsley-psw-843
Comments
Post a Comment