Vulnerabilities, CVEs and the attack surface

Listen as Stephen Pritchard, security and technology journalist at Security Insights, talks with Tod Beardsley, VP of Security Research at runZero, about vulnerabilities, CVEs, and the attack surface.

About the episode

The way we measure security threats is changing. As security has become a board-level priority, cybersecurity teams need to think in terms of risk.

But where does that leave vulnerability scores? Are venerable systems such as CVSS, and the CVEs that underpin them, still relevant?

Or could a focus on vulnerability scores be a distraction from the real threats?

The truth, as ever, lies somewhere in between. Vulnerability scores are still a very useful way of categorising risks within an application, and sharing that information. What they cannot do is map those exploits to an organisation’s network, or their own workflows, security measures or even, their business priorities.

That, though, is the CISO’s job. And, as our guest for this episode points out, today’s much more expansive and flexible networks really demand a cultural shift in how we think about the attack surface, and how we defend it.

Meet Our Speakers

todb

VP of Security Research, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
The infinite eye: How AI threat intelligence gives defenders an asymmetric edge
Tod Beardsley, HD Moore, and Jonathan Cran discuss how AI-powered threat intelligence is providing defenders with a much-needed advantage.
Podcasts
Perimeters and pathways: Protecting the complete attack surface
Tod Beardsley, Jared Atkinson, Zakir Durumeric, and HD Moore discuss the perimeters and pathways that connect internal networks to the global...
Podcasts
Bug bounties in the age of AI
In this session, Tod Beardsley and Casey Ellis explore the evolving role of bug bounties in a world increasingly shaped by artificial intelligence.
Podcasts
The network edge: EOL and exploitation
Tod Beardsley is joined by Kimber Duke & Patrick Garrity of VulnCheck to discuss the critical intersection of EOL hardware and cybersecurity...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.