<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/vulnerability scanner"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/vulnerability scanner?tag=vulnerability+scanner&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/video_medium/application-centric-vulnerability-video.mp4?source=podcast" type="video/mp4" length="7848940"/>
            <title>Application-Centric Vulnerability Management</title>
            <link>http://video.algosec.com/application-centric-vulnerability</link>
            <description>&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - Vulnerability management continues to be an important cornerstone of any cyber security program. But the unfortunate reality is that every organization has more vulnerabilities than they can realistically address. Traditionally, security teams have prioritized vulnerabilities in a very technology-centric fashion -- based on IP addresses, CVSS scores and threat path analysis -- this is not the language that business stakeholders speak or even understand.&lt;/p&gt;
&lt;p&gt;Application-Centric Vulnerability Management finally changes this paradigm -- for the first time, security teams can understand the risk in an entire business service -- complete with all its servers, databases, middleware, and the complex connectivity that's enabled by the underlying security infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-centric-vulnerability"&gt;&lt;img src="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182367</guid>
            <pubDate>Mon, 17 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Application-Centric Vulnerability Management</media:title>
            <media:description type="html">&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - Vulnerability management continues to be an important cornerstone of any cyber security program. But the unfortunate reality is that every organization has more vulnerabilities than they can realistically address. Traditionally, security teams have prioritized vulnerabilities in a very technology-centric fashion -- based on IP addresses, CVSS scores and threat path analysis -- this is not the language that business stakeholders speak or even understand.&lt;/p&gt;
&lt;p&gt;Application-Centric Vulnerability Management finally changes this paradigm -- for the first time, security teams can understand the risk in an entire business service -- complete with all its servers, databases, middleware, and the complex connectivity that's enabled by the underlying security infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-centric-vulnerability"&gt;&lt;img src="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72365f6bd62eb3ef670bda01ab75deac&amp;source=podcast&amp;photo%5fid=44182367" width="625" height="469" type="text/html" medium="video" duration="139" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>AlgoSec</category>
            <category>application-centric vulnerability management</category>
            <category>application connectivity</category>
            <category>CVSS scores</category>
            <category>cyber security</category>
            <category>network security</category>
            <category>Qualys</category>
            <category>security</category>
            <category>security infrastructure</category>
            <category>vulnerabilities</category>
            <category>Vulnerability Management</category>
            <category>vulnerability scanner</category>
        </item>
    </channel>
</rss>
