You can’t get there from here: why we need a new way to manage exposure

At Black Hat 2025, CyberRisk TV sits down with HD Moore, Founder and CEO of runZero, for a no-BS conversation on why vulnerability management is still failing enterprises — and what needs to change now. Hosted by Jackie McGuire, this interview dives deep into the real-world challenges facing security teams today: tool overload, missing assets, unauthenticated exposures, and the illusion of visibility.

HD reveals how attackers are exploiting blind spots faster than defenders can react — and why unauthenticated discovery is the secret weapon defenders need. From the evolution of pentesting to the pitfalls of modern tooling, this interview offers a powerful call to rethink how we manage risk.

Topics Covered:

  • Why vulnerability tools are worse today than 20 years ago
  • The myth of full visibility in enterprise security
  • How AI and Shadow IT are accelerating unauthenticated risk
  • The "garage keypad is 1234" problem in cyber hygiene
  • runZero’s unique approach: find everything, fast, without credentials
  • What every CISO needs to hear to justify better investments

If you're tired of dashboards full of false confidence and alerts that don’t matter, this is your wake-up call.

Meet Our Speakers

HD Moore

Founder & CEO, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
The infinite eye: How AI threat intelligence gives defenders an asymmetric edge
Tod Beardsley, HD Moore, and Jonathan Cran discuss how AI-powered threat intelligence is providing defenders with a much-needed advantage.
Podcasts
Perimeters and pathways: Protecting the complete attack surface
Tod Beardsley, Jared Atkinson, Zakir Durumeric, and HD Moore discuss the perimeters and pathways that connect internal networks to the global...
Podcasts
Bug bounties in the age of AI
In this session, Tod Beardsley and Casey Ellis explore the evolving role of bug bounties in a world increasingly shaped by artificial intelligence.
Podcasts
The network edge: EOL and exploitation
Tod Beardsley is joined by Kimber Duke & Patrick Garrity of VulnCheck to discuss the critical intersection of EOL hardware and cybersecurity...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.