Artwork
iconShare
 
Manage episode 490646280 series 2371855
Content provided by Ken Johnson and Seth Law, Ken Johnson, and Seth Law. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ken Johnson and Seth Law, Ken Johnson, and Seth Law or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
With @cktricky out on a grand tour across the country (or just unable to record for the day), @sethlaw succumbs to the dark side to give @lojikil a platform to talk about recent developments in the application security world. Specifically, a discussion on vulnerability data and scoring mechanisms, including CVE, CVSS, CWSS, and other acronyms. Wraps up with a longer discussion on the use of AI across multiple disciplines and provenance of AI Slop.
  continue reading

337 episodes