CVE Blog

The purpose of thisblogis to establish a dialogue and get your input on issues and topics important to CVE. We encourage you to useMedium,LinkedIn, orTwitterto comment on, share, or like a post. Right-click and copyhere从CVE网站分享这篇文章。


Ken Munro of Pen Test Partners Joins CVE Board

Share or commentMediumTwitterLinkedIn

Ken Munro, CVE Board member

Ken Munro

The CVE Program is pleased to welcome Ken Munro ofPen Test Partners (PTP) LLPas the newest member of theCVE Board. Ken will provide the Board with a research community perspective and help enhance collaboration between the CVE Program and that community.

About Ken

Ken is a security researcher, partner, and founder of UK’s largest independent penetration testing firm, PTP. He is a strong advocate of responsible disclosure and manages over 200 vulnerability disclosures per year. Ken regularly blogs on security topics ranging from car hacking, IoT security, and vulnerability analysis. With nearly 25 years of experience, he is a lobbyist for the regulation IoT technology in Europe, and has extensive experience working within government and industry in the United States. Ken is active within the security community, most notably in aviation, IoT, and auto, and co-organized the Aviation and Maritime villages at DEFOC. PTP research on child’s toys and smart watches have resulted in increased regulation worldwide, notably by US Senator Jackson (CA) as the inspiration behind California Senate Bill 327. As well as German Telecommunications Regulator (BNetzA) banning “My Friend Cayla” doll and various smart tracker watches in Germany. PTP is recently attributed with working closely with UK Government and law enforcement to debunk fraudulent 5G “Diffusers” scams which market regular USB drives as personal protection devices against “dangerous 5G” signals. As demonstrated in hisTED Talk,肯(Ken)是一位迷人的演讲者,他能够与听众建立联系,并让他们感到最复杂的安全讨论中。他是行业机构和协会举行的活动的常规发言人,其中包括:TED,First,Defoc和Infoserity Europe等。

About the CVE Board

TheCVE Boardincludes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE Program.

Comments or Questions?

If you have any questions about this article, please use theCVE Request Web Formand select “Other” from the dropdown menu.

We look forward to hearing from you, but more importantly, we look forward to your participation in the CVE Program!

- The CVE Team
February 12, 2021
CVE Request Web Form
(select “Other” from dropdown)


Recent Posts

页面最后更新或审查:February 14, 2021