Resilient Cyber cover image

S5E3: Patrick Garrity - Vulnerability Research, Management and Visualizations

Resilient Cyber

00:00

Determining Vulnerabilities for the CAV List and Community Building

This chapter explores the process of selecting vulnerabilities for the Common Vulnerabilities and Exposures (CAV) list, including the use of reputable sources and the challenges faced by CISA in creating a comprehensive list.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner