The Bid Picture - Cybersecurity & Intelligence Analysis Podcast, Episode 217

In this episode of The Bid Picture - Cybersecurity & Intelligence Analysis Podcast, host Bidemi Ologunde spoke with Huxley Barbee, the lead organizer for BSides NYC and a Security Evangelist at runZero, a cyber asset management solution.

The discussion covered various topics related to asset-centric investigations, such as the pros and cons of the different methods of conducting cyber asset inventory; operational technology (OT) scanning; and security research-based fingerprinting and incremental fingerprinting. Huxley also delved into vulnerability prioritization technology (VPT) and the utility of Shodan, a popular search engine for identifying and cataloging internet-connected devices and systems. Additionally, he mentioned some of the tools required for network access security; the stark reality of managing threat attack surfaces, and lots more. To wrap up, he shared insights into how runZero can aid organizations in securing all their network assets and devices.

Meet Our Speakers

Huxley Barbee

Contributor

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
We need to talk about KEV with Tod Beardsley (Decipher podcast)
Tod Beardsley joins Dennis Fisher to talk about the evolution of the KEV catalog, how much value you should place on the KEV, and his new KEVology...
Podcasts
Only a third of KEV vulnerabilities are truly critical; are you prioritizing the wrong ones?
Discover how KEVology and the KEV Collider help defenders cut through the noise by enriching KEV data with exploit scores, timelines, & real-world...
Podcasts
Filtering the KEV was really hard … until now! (Risky Biz Interview)
Casey Ellis chats with Todd Beardsley about KEVology — an analysis of the CISA KEV. KEVology helps you identify the vulnerabilities most relevant...
Podcasts
The dangers of white label devices (Error Code Podcast)
Rob King, Director of Applied Security Research, explores white-labeled surveillance and IoT hardware, why some vendors are banned by governments,...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.