Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.
Vulnerability management
Vulnerability management is always a daunting task. In multi-cloud scenario, it’s even more challenging, as Chris Hughes explains in the context of AppSec.
When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.
The high-level fundamentals are a good starting point for organizations to reduce their vulnerabilities, writes Chris Hughes.
While zero-day vulnerability attacks still occur, new research emphasizes the need for basic security hygiene to protect against most advanced persistent threats.
As technological systems become more complex through Cloud, microservices, IoT, and more, the need for sound vulnerability management is even more paramount.
Metrics are essential to running any security program — especially when developing a vulnerability management program.
With an abundance of cybersecurity tools, vulnerability management can benefit from simplifying the user experience.
With a lack of standards for risk assessment, cybersecurity tools may be leading to more confusion when determining risk prioritization.