Refine
Clear All
Your Track:
Live:
Search in:
Cyentia Podcast
Cyentia Podcast

Cyentia Podcast

This podcast explores cybersecurity through use-inspired and data-driven research. Join hosts Jay and Wade as they discuss topics with those working to find incredible insights, tell awesome data-driven stories and are willing to share their work with the larger community.

Available Episodes 10

Wade and Ben give Jay a "behind the scenes" look at the survey creation, collection, analysis and all the other work that went into the Cisco Security Outcomes Study that was released early December, 2020.

https://blogs.cisco.com/security/introducing-the-new-cisco-security-outcomes-study

Jay, Wade, David and Ben get a little philosophical as they talk about vulnerability management and the new research included in Kenna's latest volume of the Prioritization to Prediction series.  That research looks at the timeline and lifecycle of vulnerabilities, how quickly do patches come out? how quickly are CVEs published? when do vulnerability scanners start reporting and when do organizations start patching?

All volumes (including the 6th volume discussed here) can be retrieved from https://www.kennasecurity.com/resources/prioritization-to-prediction-reports/

David, Jay, Ben and Wade discuss their recent research into extreme security events made possible by Visible Risk. The group discusses the takeaways and the various elements that stood out from the research.

The research is freely available at https://www.cyentia.com/iris/

Chris Eng joins David, Ben and Jay to talk about Volume 11 of Veracode's State of Software Security. But rather than focusing on the various statistics, they focused on time-to-fix and how the various attributes of the development teams, applications and development environments affect the remediation timelines.

https://www.veracode.com/state-of-software-security-report

In this "PhD Edition" of the Cyentia Podcast, Wade and Ben discuss recently published research examining the significance of  companies exposing unsafe services to the Internet. 

Our regular library update covering recent additions including cybersecurity research from the ITU, Sonatype Tenable, and more. This is the audiobook companion to our regular library update newsletter. For the newsletter sign up at https://bit.ly/cyentialibrary. As always, you can find the library at https://library.cyentia.com.

Our regular library update covering recent additions including research from the ITU, Sonatype Tenable, and more. This is the audiobook companion to our regular library update newsletter. For the newsletter sign up at https://bit.ly/cyentialibrary. As always, you can find the library at https://library.cyentia.com.

Our regular library update covering recent additions including research from Crypsis, RiskRecon, IBM, and more. This is the audiobook companion to our regular library update newsletter. For the newsletter sign up at https://bit.ly/cyentialibrary. As always, you can find the library at https://library.cyentia.com.

Our first library update covering recent additions including research from Hacker One and Bugcrowd, ESI Thoughtlab, Audit Analytics, Hiscox and Snyk. This is the audiobook version of what we share in the library newsletter.For the newsletter sign up at https://bit.ly/cyentialibrary. As always, you can find the library at https://library.cyentia.com.

The Cyentia Library has been overhauled and the new and improved library has been released at https://library.cyentia.com/. David has done quite a bit of work on the back end (and front end) to get this working and he's joined by Ben, Wade and Jay to talk about all about the new library site.

When visiting the Cyentia Library, be sure to sign up for the Library newsletter, a low-volume (estimated at once every two weeks) series of updates highlighting new content and features of the library, delivered direct to your inbox!