Publié par : pintejp | Mai 8, 2016

The Myth of Software and Hardware Vulnerability Management

Software and Hardware Vulnerability Management is often mentioned in any good information security policy or even in a dedicated vulnerability management procedure. This is great, you have a wonderful procedure but is this the reality? Do you know what software or hardware you are relying on? Is the version clearly mentioned in the product I recently acquired? Can you easily find the vulnerabilities targeting the software on which you depends? If you can list your software in your enterprise in a single sheet of paper, you might be far away from the reality.

https://www.foo.be/2016/05/The_Myth_of_Vulnerability_Management/


Laisser un commentaire

Catégories