There are infinite vulnerabilities out there that make us susceptible to instances of cyberattack, and as of this year, we’re on track to having identified 20,000 of them. While there’s a whole risk mitigation ecosystem in place, CVE (formerly known as the Common Vulnerabilities and Exposures Program) has played a huge role in establishing a dictionary-esque database with IDs and definitions for each known vulnerability.
On today’s episode of What That Means, Camille is joined by returning guest Katie Trimble-Noble (Director, PSIRT & Bug Bounty at Intel) to describe the critical nature of CVE in greater detail.
You’ll learn:
► The origins and evolution of CVE (formerly known as the Common Vulnerabilities and Exposures Program)
► Why CVE matters, and what it does and doesn’t do
► How NVD (the National Vulnerability Database) and CVSS (the Common Vulnerability Scoring System) differ from and apply to CVE
► How risk severity is actually scored Who and what CVE Naming Authorities (CNA) are, and why they’re important
► And more
Really interesting stuff, so tune in!
*And if you like what you hear, catch an earlier conversation Camille had with Katie in WTM Episode 26: Bug Bounty and Crowdsourced Security; Alexander (RoRo) Romero joins them for a great discussion, and you don’t want to miss it: https://bit.ly/3mv9yVr
#CVE #CNA #riskmitigation #vulnerabilities #cybersecurity
-----
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
► Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021
► Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug
Follow our hosts Tom Garrison and Camille Morhardt:
► Tom: @tommgarrison
► Camille: @morhardt
Learn more about Intel Cybersecurity:
► https://www.intel.com/content/www/us/en/security/overview.html
Intel Compute Life Cycle (CLA):
► https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html
Subscribe now to Intel Business on YouTube: https://intel.ly/43XZh6J
About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.
Connect with Intel Business:
Visit Intel Business's WEBSITE: http://intel.ly/itcenter
Follow Intel Business on TWITTER: https://twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: https://linkedin.com/showcase/intel-business
Follow Intel Business on FACEBOOK: https://www.facebook.com/IntelBusiness
Why CVE is Like the Webster's Dictionary of Known Vulnerabilities | Intel Business
https://youtu.be/YXYynI1MMc4
On today’s episode of What That Means, Camille is joined by returning guest Katie Trimble-Noble (Director, PSIRT & Bug Bounty at Intel) to describe the critical nature of CVE in greater detail.
You’ll learn:
► The origins and evolution of CVE (formerly known as the Common Vulnerabilities and Exposures Program)
► Why CVE matters, and what it does and doesn’t do
► How NVD (the National Vulnerability Database) and CVSS (the Common Vulnerability Scoring System) differ from and apply to CVE
► How risk severity is actually scored Who and what CVE Naming Authorities (CNA) are, and why they’re important
► And more
Really interesting stuff, so tune in!
*And if you like what you hear, catch an earlier conversation Camille had with Katie in WTM Episode 26: Bug Bounty and Crowdsourced Security; Alexander (RoRo) Romero joins them for a great discussion, and you don’t want to miss it: https://bit.ly/3mv9yVr
#CVE #CNA #riskmitigation #vulnerabilities #cybersecurity
-----
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
► Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021
► Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug
Follow our hosts Tom Garrison and Camille Morhardt:
► Tom: @tommgarrison
► Camille: @morhardt
Learn more about Intel Cybersecurity:
► https://www.intel.com/content/www/us/en/security/overview.html
Intel Compute Life Cycle (CLA):
► https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html
Subscribe now to Intel Business on YouTube: https://intel.ly/43XZh6J
About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.
Connect with Intel Business:
Visit Intel Business's WEBSITE: http://intel.ly/itcenter
Follow Intel Business on TWITTER: https://twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: https://linkedin.com/showcase/intel-business
Follow Intel Business on FACEBOOK: https://www.facebook.com/IntelBusiness
Why CVE is Like the Webster's Dictionary of Known Vulnerabilities | Intel Business
https://youtu.be/YXYynI1MMc4
Be the first to comment



