Category: Vulnerability Assessment
Published: January 2013
To a cyber criminal, vulnerabilities on a network are hidden, high-value assets. When exposed, these vulnerabilities can be targeted for exploitation, which may result in unauthorized entry into a network, can expose confidential information, provide fuel for stolen identities, trigger theft of business secrets, violate privacy provisions of laws and regulations, or paralyze business operations. New vulnerabilities appear every day due to flaws in software, faulty configuration of applications and IT gear, and (dare we say it?) good old human error. Whatever their source, vulnerabilities don't go away by themselves. Their detection, removal, and control require vulnerability management. VM, as vulnerability management is called, is the regulated, continuous use of specialized security tools and workflow that actively help to eliminate exploitable risks.
Rating: + 7
Vulnerability Assessment | January 2013 | Article
Web Application Security | October 2012 | Analyst Report
PCI DSS | October 2012 | White Paper
PCI DSS | October 2012 | Article
Risk Management | October 2012 | White Paper
© Incisive Media Investments Limited 2013, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093.