Intel IT Center21.1 тыс
Следующее
Опубликовано 11 ноября 2021, 6:00
There are infinite vulnerabilities out there that make us susceptible to instances of cyberattack, and as of this year, we’re on track to having identified 20,000 of them. While there’s a whole risk mitigation ecosystem in place, CVE (formerly known as the Common Vulnerabilities and Exposures Program) has played a huge role in establishing a dictionary-esque database with IDs and definitions for each known vulnerability.
On today’s episode of What That Means, Camille is joined by returning guest Katie Trimble-Noble (Director, PSIRT & Bug Bounty at Intel) to describe the critical nature of CVE in greater detail.
You’ll learn:
► The origins and evolution of CVE (formerly known as the Common Vulnerabilities and Exposures Program)
► Why CVE matters, and what it does and doesn’t do
► How NVD (the National Vulnerability Database) and CVSS (the Common Vulnerability Scoring System) differ from and apply to CVE
► How risk severity is actually scored Who and what CVE Naming Authorities (CNA) are, and why they’re important
► And more
Really interesting stuff, so tune in!
*And if you like what you hear, catch an earlier conversation Camille had with Katie in WTM Episode 26: Bug Bounty and Crowdsourced Security; Alexander (RoRo) Romero joins them for a great discussion, and you don’t want to miss it: bit.ly/3mv9yVr
#CVE #CNA #riskmitigation #vulnerabilities #cybersecurity
-----
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
► Apple Podcast: podcasts.apple.com/us/podcast/...
► Spotify: open.spotify.com/show/6RN4ATo5...
Follow our hosts Tom Garrison and Camille Morhardt:
► Tom: @tommgarrison
► Camille: @morhardt
Learn more about Intel Cybersecurity:
► intel.com/content/www/us/en/se...
Intel Compute Life Cycle (CLA):
► intel.com/content/www/us/en/se...
Subscribe now to Intel Business on YouTube: intel.ly/43XZh6J
About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.
Connect with Intel Business:
Visit Intel Business's WEBSITE: intel.ly/itcenter
Follow Intel Business on TWITTER: twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: linkedin.com/showcase/intel-bu...
Follow Intel Business on FACEBOOK: facebook.com/IntelBusiness
Why CVE is Like the Webster's Dictionary of Known Vulnerabilities | Intel Business
youtu.be/YXYynI1MMc4
On today’s episode of What That Means, Camille is joined by returning guest Katie Trimble-Noble (Director, PSIRT & Bug Bounty at Intel) to describe the critical nature of CVE in greater detail.
You’ll learn:
► The origins and evolution of CVE (formerly known as the Common Vulnerabilities and Exposures Program)
► Why CVE matters, and what it does and doesn’t do
► How NVD (the National Vulnerability Database) and CVSS (the Common Vulnerability Scoring System) differ from and apply to CVE
► How risk severity is actually scored Who and what CVE Naming Authorities (CNA) are, and why they’re important
► And more
Really interesting stuff, so tune in!
*And if you like what you hear, catch an earlier conversation Camille had with Katie in WTM Episode 26: Bug Bounty and Crowdsourced Security; Alexander (RoRo) Romero joins them for a great discussion, and you don’t want to miss it: bit.ly/3mv9yVr
#CVE #CNA #riskmitigation #vulnerabilities #cybersecurity
-----
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
► Apple Podcast: podcasts.apple.com/us/podcast/...
► Spotify: open.spotify.com/show/6RN4ATo5...
Follow our hosts Tom Garrison and Camille Morhardt:
► Tom: @tommgarrison
► Camille: @morhardt
Learn more about Intel Cybersecurity:
► intel.com/content/www/us/en/se...
Intel Compute Life Cycle (CLA):
► intel.com/content/www/us/en/se...
Subscribe now to Intel Business on YouTube: intel.ly/43XZh6J
About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.
Connect with Intel Business:
Visit Intel Business's WEBSITE: intel.ly/itcenter
Follow Intel Business on TWITTER: twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: linkedin.com/showcase/intel-bu...
Follow Intel Business on FACEBOOK: facebook.com/IntelBusiness
Why CVE is Like the Webster's Dictionary of Known Vulnerabilities | Intel Business
youtu.be/YXYynI1MMc4
Свежие видео
Случайные видео
How to easily find new content ideas for your social media using Gemini for Google Workspace #Shorts