1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: How to avoid vulnerability assessment gotchas

Discussion in 'CSO' started by RSS, May 12, 2016.

  1. RSS

    RSS New Member Member

    Information security professionals don’t need to be convinced of the importance of a robust vulnerability assessment program. Published surveys including the Center for Internet Security Critical Controls consistently rank vulnerability assessment and remediation as one of the most important strategies in managing cybersecurity risk.

    It is the rare organization that has the resources to fix all vulnerabilities and trade-offs that need to be made. Sometimes, businesses will choose a technology solution with known vulnerabilities, yet continue to expect that information security will somehow protect the organization from any potential exploits that could result from this selection – no matter the cost to the information security function. But what exactly does that mean, at what cost and who is paying for it?

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page