Vulnerability Management – Process Perspective

Introduction Part 2b In this post, we dive deeper into the HOW of vulnerability management. This post is dedicated to the processes to provide a comprehensive overview. 1. Processes Figure 1: Levels [86] In this chapter, we will have a look at the processes of vulnerability management. The Center for Internet Security defines separate controls … Continue reading Vulnerability Management – Process Perspective

Vulnerability Management – Requirements, Scoping & Target Setting

Introduction Part 2 With the next blog posts, we dive deeper into vulnerability management. It is challenging  to encapsulate the complexity of vulnerability management in a just a few paragraphs. To fully cover it, one could easily write a complete guide or even a book. Therefore, I tried to find an appropriate balance between width … Continue reading Vulnerability Management – Requirements, Scoping & Target Setting

Vulnerability Management – common understanding and language enable teamwork

Part of a series This Blog post is part of the series Vulnerability Management Series: 3D (Definition, Deep-Dive, and Difficulties) Part 1 provides an overview of vulnerability management and the terms. This will be a recap for most people, but is a good starting point for all who just jump into this topic or want … Continue reading Vulnerability Management – common understanding and language enable teamwork