Risky Biz Interview: Keeping Up With CISA's KEV List

In this Risky Business News sponsored interview, Tom Uren talks to Rob King, Director of Security Research at runZero, about keeping up with the stream of vulnerabilities in the KEV list and OT devices and runZero’s research into the SSH protocol.

Meet Our Speakers

Rob King

Director of Applied Research

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
The often-overlooked truth in cybersecurity: seeing the unseen in vulnerability management
Sean Martin (ITSPmagazine) speaks with HD Moore about an overlooked truth in cybersecurity: the greatest risks are usually the things you don’t...
Podcasts
You can’t get there from here: why we need a new way to manage exposure
At Black Hat 2025, CyberRisk TV sits down with HD Moore for a no-BS conversation on why vulnerability management is still failing enterprises.
Podcasts
Is Vuln Management Dead?
HD Moore joins Paul's Security Weekly to share how vulnerability management and asset discovery are evolving in the age of emerging technologies....
Podcasts
Metasploit's Origin, Browser Bugs & Exposure Management
HD shares the story of building the top pen testing framework, early cybersecurity tales, and how his Month of Browser Bugs ended ActiveX.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.