Questions always come up about how cyber security audit teams find and categorize vulnerabilities, and how to mitigate them. Vulnerability reporting has come a long way since MITRE Corporation invented the CVE concept in 1999. This presentation covers how vulnerability reporting works today, Red Hat’s position of trust in the CVE.org infrastructure, why customers should trust Red Hat as the ultimate source of truth for security vulnerability information around Red Hat products, and a few tips for navigating Red Hat vulnerability information.
In this webinar, we’ll cover the universal standard for vulnerability reporting called the CVE program, Red Hat leading role, and why you can Trust Red Hat for useful information.
- Red Hat’s leading role and the Red Hat security repository
- Bug hunting stories
- Numbers
- Audits
- FAQs
Live event date: Tuesday, July 8, 2025 | 12 p.m. ET
On-demand event: Available for one year afterward.
D. Greg Scott
Red Hat Principal Technical Account Manager, Telco industry
Greg is a Red Hat Principal Technical Account Manager and holds CISSP number 358671. During the day, Greg helps the world’s largest open source software company support the world’s largest telecom companies. Nights and weekends, Greg helps Jerry Barkley, Jesse Jonsen, and other characters save the world. Greg also collects phishing samples and grades them. Because good defense means learning to think like an attacker. Prior to joining Red Hat, Greg earned a living by building custom firewalls and fighting ransomware attacks.