Blogs
Final - A Vulnerability …
Vulnerability Scanning Overview Lay out what vulnerability scanning is and how it is a part of your organization’s defense strategy. Do not get specific about tools or types of scans. Examples: Location Internal External Vulnerabilities found will be added to a tracking system Scanning is not …
Pt. 2 - A Vulnerability …
Assessing and determining “scope” The goal scope of your program should encompass all networks and systems across all geographic locations that are owned by your organization. You will find most individuals scoff at this goal, which is fair. It is a very daunting task to achieve and I …
Intro - A Vulnerability …
Background I was tasked with creating a vulnerability management program from the ground up. Our current program was designed 15 years prior, for a different time, with a different objective. It centered around physical security and did not address core principles seen today such as risk ratings, …