1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

War stories: the vulnerability scanning argument

Discussion in 'CSO' started by RSS, Oct 4, 2016.

  1. RSS

    RSS New Member Member

    Over the last couple of decades I have had all sort of different jobs. I have to count myself as rather fortunate for the experiences I have had along the way. They really went a long way to teach me some valuable lessons. Also, in some cases, they taught me how to hold my tongue.

    In one such job years ago, I was working on implementing a company wide vulnerability scanning platform. As you might imagine, especially if you have done this sort of project before, there was some land mines I had to contend with in due course.

    At this particular job there were all sorts of different business units who acted as individual fiefdoms and had little interest in having their system scanned by anyone. “We have a firewall, we’re fine” one team lead had grouched at me. “We have detection capabilities and we’ll know if you scan our systems."

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page