Is vuln management dead? (Paul's Security Weekly #880)

HD Moore joins Paul's Security Weekly to discuss finding all the things and how vulnerability management has changed. Tune in for a fun episode featuring Paul Asadoorian, Mandy Logan, Larry Pesce, Josh Marpet, Lee Neely, Sam Bowne, and Bill Swearingen.

The crew explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. Other meaty topics include the implications of cyber warfare, the persistent threat of default passwords, and the integration of open source tools in enhancing security measures. [Note: read our blog to see how you can find default credentials in your environment with runZero!]

Tune in for hot takes on everything from vulnerability management, aircraft tracking, and data filtering to the shared responsibility model in cloud infrastructure. The hosts also explore the possibilities and limitations of AI in cybersecurity and the potential for future advancements, particularly in localized LLMs. 

The episode wraps it all up with a discussion about the intersection of technology, cybersecurity, and privacy, the implications of AI on energy demands, vulnerabilities in telecom infrastructure, the complexities of network maintenance, and the challenges of ransomware negotiations. 

Want to get your hands on the free Community Edition discussed in this episode? Start a free trial and simply convert it to our free edition at the end of the 21-day trial period.


Meet Our Speakers

HD Moore

Founder & CEO, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
The infinite eye: How AI threat intelligence gives defenders an asymmetric edge
Tod Beardsley, HD Moore, and Jonathan Cran discuss how AI-powered threat intelligence is providing defenders with a much-needed advantage.
Podcasts
Perimeters and pathways: Protecting the complete attack surface
Tod Beardsley, Jared Atkinson, Zakir Durumeric, and HD Moore discuss the perimeters and pathways that connect internal networks to the global...
Podcasts
Bug bounties in the age of AI
In this session, Tod Beardsley and Casey Ellis explore the evolving role of bug bounties in a world increasingly shaped by artificial intelligence.
Podcasts
The network edge: EOL and exploitation
Tod Beardsley is joined by Kimber Duke & Patrick Garrity of VulnCheck to discuss the critical intersection of EOL hardware and cybersecurity...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.