Badges
20 Points
4 Years
User Activity
Over 4 years ago
Answered a question: How inadvisable is it to use a single vulnerability analysis tool?
You wont find a single tool that will report on all the vulnerabilities that can crop up in your infrastructure. Such a tool would need to cover too many areas (On-Prem or Cloud, Network, Database(s)....). A better approach is to start by assessing what you absolutely must…
Over 4 years ago
Answered a question: What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
A risk-based approach is more effective but we need to go beyond just risk-based vulnerability assessment. We need to take into account the impact on our business and brand reputation of data being compromised, we need to take into account whether we are getting better or…
Over 4 years ago
Answered a question: What are the benefits of continuous scanning for vulnerability management?
As data increasingly moves from on-prem to Public Cloud, we need a complete rethink about how we view and protect our critical databases. It is common for Cloud databases to be spun up, data ingested and then the database taken down again very quickly. In this situation its…
Answers
Over 4 years ago
Vulnerability Management
Over 4 years ago
Vulnerability Management
Over 4 years ago
Vulnerability Management