Vulnerability Management
From humble beginnings as a scan to see whether corporate endpoints are susceptible to the headline malware du jour, vulnerability management has evolved into toolsets that take a holistic view of all the various potential problems that it's impossible not to have on an enterprise-scale IT infrastructure. This Security School lesson featuring information security expert Kevin Beaver offers guidance on capabilities you may want to have when addressing vulnerabilities, for example support for authenticated vulnerability scans. He also looks at the current state of capabilities for remediation.
TOP