Packet Protector cover image

PP084: Inside the CVE Process With Cisco (Sponsored)

Packet Protector

00:00

How Vulnerabilities Are Identified and Validated

Drew asks how vulnerabilities are found; Marco and Osman outline discovery sources, reproducibility, lab testing, and automation of test cases.

Play episode from 18:58
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app