Episodes

Risk, Measured: Power Laws and Security
33:50 | 01.27.2021

Github as a Source for Exploits?
38:32 | 01.20.2021

A Walk Down Vulnerability Lane
52:37 | 12.30.2020

Are Your Presents Spying On You?
42:12 | 12.16.2020

The Future of Cloud Security w/ VMware Carbon Black
46:24 | 12.09.2020

re:Invent'ing 2020
25:05 | 11.25.2020

The Attacker-Defender Divide w/ Cyentia Institute
54:24 | 11.18.2020

The Death Of Containers As We Know Them?
26:04 | 11.11.2020

In Search Of Assets At Risk w/ Cyentia Institute
55:47 | 11.09.2020

Managing 3rd Party Code Risk
26:45 | 10.28.2020

Measuring What Matters w/ Cyentia Institute
01:07:43 | 10.21.2020

Reporting Risk To The Board
33:05 | 10.07.2020

Winning The Remediation Race w/ Cyentia Institute
43:16 | 09.30.2020

Around the Virtual Table with Chris, Jeremiah & Ed
52:11 | 09.23.2020

The Exploit Prediction Scoring System (EPSS)
54:25 | 09.16.2020

Getting Real About Remediation w/ Cyentia Institute
58:23 | 09.09.2020

Risk, Measured: Epidemiology for Cybersecurity
49:07 | 08.26.2020

The State of Threat Intelligence w/ GreyNoise
36:29 | 08.19.2020

DEF CON Was Actually Canceled (sort of)
19:16 | 08.12.2020

Patch Tuesday Rituals with JCran
25:24 | 08.05.2020

A Chronological Journey Through Risk-Based Vuln Management
53:44 | 07.29.2020

Can ML Solve the Cybersecurity Skills Gap?
36:51 | 07.22.2020

Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute
49:23 | 07.15.2020

Intrigue In Discovery and Digital Fingerprinting
16:35 | 07.08.2020

Risk, Measured: Components of Cyber Risk
28:50 | 06.30.2020

Building Zero Trust is Hard
26:24 | 06.23.2020

A Brief History of Vulnerability Management
42:20 | 06.23.2020