About KEV

 Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment.


https://securityweeklytv.libsyn.com/the-known-exploited-vulnerability-catalogue-aka-the-kev-tod-beardsley-psw-843

Comments

Popular posts from this blog

Endor Labs Announces Integrated SAST Offerings

The Hidden Cost of DevSecOps: Time and Financial Burden of Security on Developers

OWASP Releases Enhanced Dependency-Check Tool with Advanced Tagging and Policy Management Features