Vulnerability Management at the Crossroads, part II
In the previous edition of Network Security (part I), I explored the history of vulnerability management, and concluded that conventional approaches to fighting attack were destined for failure in the light of dynamic and aggressive threat evolution in the modern blackhat community. The bottom line is that vulnerability scanning tools are gradually losing the battle against an attacker community that is becoming faster and more adept at developing zero-day exploits.
This second and final part provides a brief description of how we might reinvent the vulnerability management process.
View publication: Vulnerability management at the crossroads, part II