Vulnerability Management – Scanning

This is second post in the Vulnerability Management, a practical approach series. Buckle up and let's tackle one parameter at a time, appreciating the sheer importance of each in our quest for a foolproof strategy.

Vulnerability Management – Identification

Identifying assets for scanning is the very first and most important step. The program's success depends on how well the organisation has inventoried its assets.We will discuss the must-to-have fields and some good-to-have fields for a CMDB tool.

Up ↑