Say Hello to the Security Science Podcast

Jun 25, 2020
Dan Mellinger
Senior Director of Corporate Communications

Share with Your Network

Working in technology communications for the last decade, I can unequivocally say that the best part of my job is the explanations of complex topics I regularly receive from the best and brightest minds in the industry. 

It’s truly amazing to have the opportunity to learn about concepts like Machine Learning from Michael Roytman, how to scan the Internet from Jonathan Cran, why you can’t buy Zero Trust from Jerry Gamblin, or learning about the history of Vulnerability Management from Ed Bellis. This is why I’m so pleased to announce that you’ll now be able to get answers to many of your most pressing questions in podcast format. You can listen via our dedicated podcast homepage, the player below, or subscribe on Apple Podcasts, Spotify and eventually Google Podcasts. 

The Security Science Podcast was conceived to try and give anyone with an internet connection the same access I’ve enjoyed for so long. To have experts in their fields explain cybersecurity concepts, technologies, myths, facts, trends, and everything in between. And we aim to have a little fun as well.

I hope you find the podcast informative and entertaining. Don’t hesitate to DM me via Twitter @DTMellinger if you have any feedback and to suggest topics to cover or guests to reach out to. 

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...



Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.