Imagen de portada del programa VulnWise

VulnWise

Podcast de vulnwise

inglés

Tecnología y ciencia

Empieza 7 días de prueba

$99 / mes después de la prueba.Cancela cuando quieras.

  • 20 horas de audiolibros al mes
  • Podcasts solo en Podimo
  • Podcast gratuitos
Prueba gratis

Acerca de VulnWise

Welcome to VulnWise – your guide to conquering the chaos of vulnerability management. Hosted by two tech startup co-founders in the cybersecurity space, our bi-weekly podcast features best in class cybersecurity experts from top organizations to discuss strategies, insights, and trends in vulnerability management and cybersecurity. From managing risks to staying ahead of emerging threats, we tackle the topics that matter most. Whether you're a seasoned professional or just starting out, join us every other week for actionable advice and inspiring conversations.

Todos los episodios

7 episodios

episode VulnWise S1E6: Into the Minds of CISOs, Analysts, and VM Practitioners with Jon Oltsik artwork

VulnWise S1E6: Into the Minds of CISOs, Analysts, and VM Practitioners with Jon Oltsik

In this episode of the VulnWise Show, hosts Steve Carter and Scott Kuffer engage with cybersecurity expert and semi-retired analyst Jon Oltsik to discuss the evolving landscape of vulnerability and exposure management. They explore best practices derived from conversations with CISOs, the role of AI in vulnerability management, and the persistent challenges of prioritization. The discussion also delves into incident response processes, the significance of threat modeling, and the implications of SLAs in managing vulnerabilities. Jon shares insights on the analyst perspective in cybersecurity and the relevance of frameworks like CTEM, emphasizing the need for continuous education in the field.

24 de abr de 2025 - 37 min
episode Patching and Bug Bounty Programs with Rishika Hooda artwork

Patching and Bug Bounty Programs with Rishika Hooda

In this episode of the VulnWise Podcast, Scott Kuffer and Steve Carter talk to Rishika Hooda, a senior technical program manager at Google, who shares her extensive experience in cybersecurity, particularly in managing Android's patching and bug bounty programs. The conversation delves into the complexities of vulnerability management at scale, the importance of prioritization, and the challenges faced by large organizations in maintaining security. Rishika emphasizes the need for transparency, context, and effective communication within teams to enhance vulnerability management processes.Key Moments00:00 Introduction to Cybersecurity and Vulnerability Management02:23 Understanding Android's Patching and Bug Bounty Programs08:14 Challenges in Scaling Security Programs14:27 Best Practices in Vulnerability Prioritization19:32 The Complexity of Patching in a Global Ecosystem20:03 The Process of CVE Publication and Transparency22:42 Measuring Effectiveness of Vulnerability Management Programs#patching #securityprogram #bugbounty #podcast

10 de mar de 2025 - 32 min
episode The Intersection of Threat and Vulnerability Intelligence with Eli Woodward artwork

The Intersection of Threat and Vulnerability Intelligence with Eli Woodward

In this episode of the VulnWise show, Steve Carter and Scott Kuffer engage with Eli Woodward, a seasoned cyber threat analyst, to explore the intricate relationship between threat intelligence and vulnerability management. They discuss the evolving role of SOC teams, the discrepancies in vulnerability exploitation reports, and the importance of prioritization in vulnerability management. Eli shares insights on evaluating CVEs, the impact of AI on security operations, and his experiences at the National Intelligence History Conference, emphasizing the need for continuous learning and adaptation in the cybersecurity landscape. Key Moments00:00 Introduction to Cybersecurity and Vulnerability Management 03:11 Understanding Threat Intelligence vs. Vulnerability Intelligence 06:00 The Evolution of Security Operations 08:58 Discrepancies in Vulnerability Exploitation Reports 12:09 The Role of Initial Access in Breaches 15:09 Prioritization of Vulnerabilities in Organizations 17:58 Evaluating and Classifying CVEs 21:05 The Impact of AI on Cybersecurity 23:50 Future Trends in Vulnerability Management 26:59 Insights from Bletchley Park Conference 29:54 Final Thoughts and Key Takeaways#VulnerabilityIntelligence #ThreatIntelligence #AIinSecurity #CybersecurityTrends

24 de feb de 2025 - 41 min
Muy buenos Podcasts , entretenido y con historias educativas y divertidas depende de lo que cada uno busque. Yo lo suelo usar en el trabajo ya que estoy muchas horas y necesito cancelar el ruido de al rededor , Auriculares y a disfrutar ..!!
Muy buenos Podcasts , entretenido y con historias educativas y divertidas depende de lo que cada uno busque. Yo lo suelo usar en el trabajo ya que estoy muchas horas y necesito cancelar el ruido de al rededor , Auriculares y a disfrutar ..!!
Fantástica aplicación. Yo solo uso los podcast. Por un precio módico los tienes variados y cada vez más.
Me encanta la app, concentra los mejores podcast y bueno ya era ora de pagarles a todos estos creadores de contenido

Elige tu suscripción

Más populares

Premium

20 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

Empieza 7 días de prueba
Después $99 / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares

Prueba gratis

Empieza 7 días de prueba. $99 / mes después de la prueba. Cancela cuando quieras.