The CISA Known Exploited Vulnerabilities (KEV) Catalog is a vital resource, but interpreting it for your specific environment remains a challenge.
In this episode of runZero Hour, Tod Beardsley, Rob King, and very special guest Wade Sparks (CISA and VulnCheck KEV veteran) explore the science of KEVology and discuss:
- The KEVology report: Deep research on how to interpret KEV entries as dynamic data points rather than rigid rules.
- KEV Collider: A live demonstration of our latest tool that dissects how KEV entries behave across exploit availability, scoring systems, and time.
- How to get an "A" in risk management: Learn to turn KEV analysis into a repeatable practice so your team can prioritize faster and focus effort where it counts.
Get the latest news and expert insights delivered in your inbox.