
BTS #35 – The Known Exploited Vulnerability catalogue, aka the KEV – Tod Beardsley
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment.
The post BTS #35 – The Known Exploited Vulnerability catalogue, aka the KEV – Tod Beardsley appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
*** This is a Security Bloggers Network syndicated blog from Eclypsium | Supply Chain Security for the Modern Enterprise authored by Chris Garland. Read the original post at: https://eclypsium.com/podcasts/bts-35-the-known-exploited-vulnerability-catalogue-aka-the-kev-tod-beardsley/