Security vulnerability management and the CVE database

Information security departments use the Common Vulnerabilities and Exposures (CVE) database to track potential vulnerabilities. Regulators and corporate customers increasingly set compliance requirements that demand action on entries in the CVE database. Tune in to find out about the processes that Red Hat uses to report, evaluate, and fix vulnerabilities and the tools available to assess your risks. In this episode, we’ll cover: - What CVE entries are and how they work. - How Red Hat reports and evaluates security vulnerabilities. - How Red Hat develops and releases fixes for vulnerabilities. - Ways that Red Hat works with upstream communities and security vendors. - Tools you can use to evaluate your risks and apply remediations.

Intervenants

Kevin White | Senior Technical Account Manager, Red Hat

Kevin White is a Technical Account Manager (TAM) and has been with Red Hat since 2019. He works with Red Hat customers in the financial services industry and specializes in Red Hat® Ansible® Automation Platform and middleware products.

Matthew Juneau | Senior Product Security Engineer, Red Hat

Matthew Juneau has been a Product Security Engineer with Red Hat since 2018. He was previously a Red Hat Platform TAM.