Kenna & VMware Carbon Black Collaborate  
Learn More >
Contact Us
Talk to an Expert
Request a demo

Say Hello to the Security Science Podcast

Jun 25, 2020
Dan Mellinger

Share with Your Network

Working in technology communications for the last decade, I can unequivocally say that the best part of my job is the explanations of complex topics I regularly receive from the best and brightest minds in the industry. 

It’s truly amazing to have the opportunity to learn about concepts like Machine Learning from Michael Roytman, how to scan the Internet from Jonathan Cran, why you can’t buy Zero Trust from Jerry Gamblin, or learning about the history of Vulnerability Management from Ed Bellis. This is why I’m so pleased to announce that you’ll now be able to get answers to many of your most pressing questions in podcast format. You can listen via our dedicated podcast homepage, the player below, or subscribe on Apple Podcasts, Spotify and eventually Google Podcasts. 

The Security Science Podcast was conceived to try and give anyone with an internet connection the same access I’ve enjoyed for so long. To have experts in their fields explain cybersecurity concepts, technologies, myths, facts, trends, and everything in between. And we aim to have a little fun as well.

I hope you find the podcast informative and entertaining. Don’t hesitate to DM me via Twitter @DTMellinger if you have any feedback and to suggest topics to cover or guests to reach out to. 

Share with Your Network

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms. Download the research report to learn more about the key findings: Common asset platforms and their typical risk profiles…


5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is just as critical to IT as it is to Security and DevOps.  And it’s worth getting right: Vulnerabilities can leave your most strategic assets—and your business itself—exposed to cyber threats…




Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You can learn more about the Exploit Prediction Scoring System and use the interactive calculator here:…


© 2020 Kenna Security. All Rights Reserved. Privacy Policy.