DiscoverCloud Security Podcast by GoogleEP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation
EP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation

EP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation

Update: 2025-12-01
Share

Description

Guest:

  • Caleb Hoch, Consulting Manager on Security Transformation Team, Mandiant, Google Cloud

Topics:

  • How has vulnerability management (VM) evolved beyond basic scanning and reporting, and what are the biggest gaps between modern practices and what organizations are actually doing?
  • Why are so many organizations stuck with 1990s VM practices?
  • Why mitigation planning is still hard for so many?
  • Why do many organizations, including large ones, still rely on unauthenticated scans despite the known importance of authenticated scanning for accurate results?
  • What constitutes a "gold standard" vulnerability prioritization process in 2025 that moves beyond CVSS scores to incorporate threat intelligence, asset criticality, and other contextual factors?
  • What are the primary human and organizational challenges in vulnerability management, and how can issues like unclear governance, lack of accountability, and fear of system crashes be overcome?
  • How is AI impacting vulnerability management, and does the shift to cloud environments fundamentally change VM practices?

Resources:

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

EP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation

EP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation

Anton A Chuvakin