Security Science

Follow Security Science
Share on
Copy link to clipboard

Cybersecurity shouldn’t be a black box. Security Science aims to demystify cybersecurity with education combined with a dose of entertainment. We will tap a mix of experts to tackle the gamut of security topics - from the (mis)use of AI to deep analysis of specific vulnerabilities - grounding out each episode with measurable outcomes or joking around when there is a lack thereof. New episodes every Wednesday.

Kenna Security


    • Jul 26, 2023 LATEST EPISODE
    • monthly NEW EPISODES
    • 39m AVG DURATION
    • 69 EPISODES


    Search for episodes from Security Science with a specific topic:

    Latest episodes from Security Science

    Analyzing Vulnerability Remediation Strategies w/ Cyentia Institute

    Play Episode Listen Later Jul 26, 2023 49:22


    The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute - guests Ed Bellis and Wade Baker discuss P2P Volume 1 which quantifies the performance of vulnerability prioritization and remediation strategies for the very first time.

    Intrigue In Discovery and Digital Fingerprinting

    Play Episode Listen Later Jul 12, 2023 16:34


    Want more detail than Shodan queries? Need to figure out which devices have that new critical vuln and are exposed to the internet? Creator of Intrigue.io, Jcran discusses his creation and touches on the topics of digital fingerprinting and discovery tools.

    Risk, Measured: Components of Cyber Risk

    Play Episode Listen Later Jun 28, 2023 28:49


    The first episode in a Security Science mini-series called Risk, Measured - Kenna's Chief Data Scientist, Michael Roytman discusses the theory and components used to measure risk.

    Building Zero Trust is Hard

    Play Episode Listen Later Jun 14, 2023 26:23


    Recorded during the early days of the pandemic in 2020, Covid-19 thrust the concept of Zero Trust architectures into the security mainstream. Researcher, Builder, Hacker, Traveler, and Kenna's head of Security and Compliance, Jerry Gamblin discusses Zero Trust and the realities of the work required to truly adopt the architecture, probably bursting a few bubbles along the way.

    A Brief History of Vulnerability Management

    Play Episode Listen Later May 30, 2023 42:19


    In the very first episode of Security Science the Father of Risk-Based Vulnerability Management, Ed Bellis walks us through the history of Vulnerability Management. From the dark times before the CVE list and open-source scanners to the capabilities of today's best performing vulnerability management programs.

    Why Hasn't Cybersecurity Been Automated?

    Play Episode Listen Later Feb 16, 2022 36:51


    We discuss why the promise of automating cybersecurity has yet to be fully realized.

    What To Look For In CVEs

    Play Episode Listen Later Feb 2, 2022 25:51


    CVE data is often misinterpreted. Jerry Gamblin discusses why that is and what to look for to get the most out of CVE data.

    Measuring and Minimizing Exploitability w/ Cyentia Institute

    Play Episode Listen Later Jan 19, 2022 42:02


    We hop on the line with the Cyentia Institute to discuss our latest joint research, Prioritization to Prediction, Volume 8: Measuring and Minimizing Exploitability. The new report reveals that exploitability for an organization can, in fact, be measured and reveals the best strategies to minimize it.

    Exploit Prediction Scoring System - Now With Live Data

    Play Episode Listen Later Aug 18, 2021 47:25


    Establishing Defender Advantage w/ Cyentia Institute

    Play Episode Listen Later Jun 2, 2021 70:15


    We tackle a hotly contested debate as old as cybersecurity itself: does releasing exploit code do more harm than good?

    How CIOs Get Things Done

    Play Episode Listen Later May 26, 2021 34:49


    We interview Collin Boyce, Chief Information Officer for the City of Tucson, Arizona and discuss his process of turning impossible ideas into real projects that achieve meaningful results.

    Counting CVEs

    Play Episode Listen Later Apr 7, 2021 22:44


    Dive into a quick history of the CVE List as we kick off a quarterly update that tracks the progress of new CVEs issued.

    Vulnerability Disclosure and Responsible Exposure

    Play Episode Listen Later Mar 31, 2021 34:27


    We discuss and add some quantifiable data to a hot-button issue in the cybersecurity industry: responsible disclosure of vulnerabilities and exploits.

    Risk, Measured: 7 Characteristics of Good Metrics

    Play Episode Listen Later Mar 17, 2021 45:25


    Continuing our miniseries into Risk, Measured: we go back to statistics class and discuss some of the characteristics of good metrics to help people understand what you should be looking for when you want to meaningfully quantify cybersecurity phenomena, program performance, or anything really.

    Why Vulnerability Scores Can’t Be Looked At In A Vacuum

    Play Episode Listen Later Mar 10, 2021 22:41


    Sometimes a number is just a number. Context - the information and environment around the number - is what really matters. We discuss how this concept holds especially true in vulnerability management and risk scoring.

    More Blue Team Voices

    Play Episode Listen Later Mar 3, 2021 30:55


    We discuss the general lack of defensive perspectives in cybersecurity media and culture, how that impacts perceptions and decision making, and what we can do about it.

    Risk, Measured: Power Laws and Security

    Play Episode Listen Later Jan 27, 2021 33:50


    We discuss the application of power law distributions to cybersecurity.

    Github as a Source for Exploits?

    Play Episode Listen Later Jan 20, 2021 38:35


    We look at the phenomena of exploit code moving from traditional and cybersecurity-centric databases like Exploit-DB and Metasploit and instead being published on Github. Is Github becoming a de facto database for exploit code?

    Github as a Source for Exploits?

    Play Episode Listen Later Jan 20, 2021 38:32


    We look at the phenomena of exploit code moving from traditional and cybersecurity-centric databases like Exploit-DB and Metasploit and instead being published on Github. Is Github becoming a de facto database for exploit code?

    A Walk Down Vulnerability Lane

    Play Episode Listen Later Dec 30, 2020 52:42


    Kenna Security recently celebrated its 10-year anniversary on Dec. 10th, 2020; so we decided to do what we do best and take a data-based (and rare) review of the top vulnerabilities from the past decade, year-by-year.

    walk vulnerability kenna security
    A Walk Down Vulnerability Lane

    Play Episode Listen Later Dec 30, 2020 52:37


    Kenna Security recently celebrated its 10-year anniversary on Dec. 10th, 2020; so we decided to do what we do best and take a data-based (and rare) review of the top vulnerabilities from the past decade, year-by-year.

    walk vulnerability kenna security
    Are Your Presents Spying On You?

    Play Episode Listen Later Dec 16, 2020 42:16


    We discuss the security and privacy of connected gifts this holiday shopping season.

    Are Your Presents Spying On You?

    Play Episode Listen Later Dec 16, 2020 42:12


    We discuss the security and privacy of connected gifts this holiday shopping season.

    The Future of Cloud Security w/ VMware Carbon Black

    Play Episode Listen Later Dec 9, 2020 46:28


    We welcome a special guest from VMware Carbon Black to discuss the state of cloud infrastructure and security, primarily through the lens of vulnerability management today, tomorrow, and far into the future.

    The Future of Cloud Security w/ VMware Carbon Black

    Play Episode Listen Later Dec 9, 2020 46:24


    We welcome a special guest from VMware Carbon Black to discuss the state of cloud infrastructure and security, primarily through the lens of vulnerability management today, tomorrow, and far into the future.

    re:Invent'ing 2020

    Play Episode Listen Later Nov 25, 2020 25:07


    Jerry Gamblin gives us a pre-thanksgiving primer for Amazon AWS re:Invent 2020, which will be held from Nov. 30 - Dec 18th on a computer monitor near you.

    re:Invent'ing 2020

    Play Episode Listen Later Nov 25, 2020 25:05


    Jerry Gamblin gives us a pre-thanksgiving primer for Amazon AWS re:Invent 2020, which will be held from Nov. 30 - Dec 18th on a computer monitor near you.

    The Attacker-Defender Divide w/ Cyentia Institute

    Play Episode Listen Later Nov 18, 2020 54:29


    We discuss the sixth and latest report in our ongoing dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 6: The Attacker-Defender Divide looks at exploitation events from 2019 to analyze the momentum shifts between cybersecurity hackers and the teams defending organizations from attack.

    The Attacker-Defender Divide w/ Cyentia Institute

    Play Episode Listen Later Nov 18, 2020 54:24


    We discuss the sixth and latest report in our ongoing dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 6: The Attacker-Defender Divide looks at exploitation events from 2019 to analyze the momentum shifts between cybersecurity hackers and the teams defending organizations from attack.

    The Death Of Containers As We Know Them?

    Play Episode Listen Later Nov 11, 2020 26:06


    Will Docker’s download rate limits kill containers as we know them today?

    The Death Of Containers As We Know Them?

    Play Episode Listen Later Nov 11, 2020 26:04


    Will Docker’s download rate limits kill containers as we know them today?

    In Search Of Assets At Risk w/ Cyentia Institute

    Play Episode Listen Later Nov 9, 2020 55:52


    We discuss the fifth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 5: In Search of Assets at Risk.

    In Search Of Assets At Risk w/ Cyentia Institute

    Play Episode Listen Later Nov 9, 2020 55:47


    We discuss the fifth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 5: In Search of Assets at Risk.

    Managing 3rd Party Code Risk

    Play Episode Listen Later Oct 28, 2020 26:48


    We discuss the challenges managing risk in 3rd party code from things like Open Source Software libraries.

    Managing 3rd Party Code Risk

    Play Episode Listen Later Oct 28, 2020 26:45


    We discuss the challenges managing risk in 3rd party code from things like Open Source Software libraries.

    Measuring What Matters w/ Cyentia Institute

    Play Episode Listen Later Oct 21, 2020 67:49


    We discuss the fourth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 4: Measuring What Matters In Remediation.

    Measuring What Matters w/ Cyentia Institute

    Play Episode Listen Later Oct 21, 2020 67:43


    We discuss the fourth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 4: Measuring What Matters In Remediation.

    Reporting Risk To The Board

    Play Episode Listen Later Oct 7, 2020 33:08


    We discuss the evolution of cybersecurity metrics and reporting to Boards of Directors.

    Reporting Risk To The Board

    Play Episode Listen Later Oct 7, 2020 33:05


    We discuss the evolution of cybersecurity metrics and reporting to Boards of Directors.

    Winning The Remediation Race w/ Cyentia Institute

    Play Episode Listen Later Sep 30, 2020 43:20


    We discuss the third report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 3: Winning the Remediation Race looks at (1) how quickly and (2) how many vulnerabilities a given organization can handle. Answering two key questions: Can organizations remediate all of the new vulnerabilities in their environments? If not, can organizations remediate all of the new High-Risk vulnerabilities in their environments?

    Winning The Remediation Race w/ Cyentia Institute

    Play Episode Listen Later Sep 30, 2020 43:16


    We discuss the third report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 3: Winning the Remediation Race looks at (1) how quickly and (2) how many vulnerabilities a given organization can handle. Answering two key questions: Can organizations remediate all of the new vulnerabilities in their environments? If not, can organizations remediate all of the new High-Risk vulnerabilities in their environments?

    Around the Virtual Table with Chris, Jeremiah & Ed

    Play Episode Listen Later Sep 23, 2020 52:16


    Today on Security Science, we have a special around the virtual table with some of the biggest names in cybersecurity discussing a wide range of topics like securing remote workers, whether companies are really moving to the cloud, and the impact of the 2020 presidential election.

    virtual table
    Around the Virtual Table with Chris, Jeremiah & Ed

    Play Episode Listen Later Sep 23, 2020 52:11


    Today on Security Science, we have a special around the virtual table with some of the biggest names in cybersecurity discussing a wide range of topics like securing remote workers, whether companies are really moving to the cloud, and the impact of the 2020 presidential election.

    virtual table
    The Exploit Prediction Scoring System (EPSS)

    Play Episode Listen Later Sep 16, 2020 54:30


    We discuss the Exploit Prediction Scoring System (EPSS), the first open, data-driven framework for assessing vulnerability threat: that is, the probability that a vulnerability will be exploited in the wild within the first twelve months after public disclosure.

    The Exploit Prediction Scoring System (EPSS)

    Play Episode Listen Later Sep 16, 2020 54:25


    We discuss the Exploit Prediction Scoring System (EPSS), the first open, data-driven framework for assessing vulnerability threat: that is, the probability that a vulnerability will be exploited in the wild within the first twelve months after public disclosure.

    Getting Real About Remediation w/ Cyentia Institute

    Play Episode Listen Later Sep 9, 2020 58:28


    We discuss the second report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction, Volume 2: Getting Real About Remediation picks up on the overall vulnerability landscape analysis from Volume 1 and dives deep into the vulnerability landscape from within actual enterprise networks (a little over 500 of them to be exact).

    Getting Real About Remediation w/ Cyentia Institute

    Play Episode Listen Later Sep 9, 2020 58:23


    We discuss the second report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction, Volume 2: Getting Real About Remediation picks up on the overall vulnerability landscape analysis from Volume 1 and dives deep into the vulnerability landscape from within actual enterprise networks (a little over 500 of them to be exact).

    Risk, Measured: Epidemiology for Cybersecurity

    Play Episode Listen Later Aug 26, 2020 49:11


    How does the spread, detection, and response to viruses like COVID-19 compare with cybersecurity practices today? In the second episode of our Risk, Measured series we talk to special guest, Northeastern University Assistant Professor, Sam Scarpino about how Epidemiology relates to cybersecurity.

    Risk, Measured: Epidemiology for Cybersecurity

    Play Episode Listen Later Aug 26, 2020 49:07


    How does the spread, detection, and response to viruses like COVID-19 compare with cybersecurity practices today? In the second episode of our Risk, Measured series we talk to special guest, Northeastern University Assistant Professor, Sam Scarpino about how Epidemiology relates to cybersecurity.

    The State of Threat Intelligence w/ GreyNoise

    Play Episode Listen Later Aug 19, 2020 36:32


    We chat about the state of everyone’s favorite buzz technology: Threat Intelligence with our favorite internet fingerprinter, Kenna’s head of research, Jcran. Joining us is a special guest, longtime pentester, infamous internet listener, and founder of GreyNoise Intelligence, Andrew Morris.

    The State of Threat Intelligence w/ GreyNoise

    Play Episode Listen Later Aug 19, 2020 36:29


    We chat about the state of everyone’s favorite buzz technology: Threat Intelligence with our favorite internet fingerprinter, Kenna’s head of research, Jcran. Joining us is a special guest, longtime pentester, infamous internet listener, and founder of GreyNoise Intelligence, Andrew Morris.

    Claim Security Science

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel