Who's the stakeholder for vulnerability management?
@anandshinde99412 жыл бұрын
Everyone. The organization to safeguard its assets from attacks. The customer for safety of their data.
@ThoriumHeavyIndustries2 жыл бұрын
You rely on scans here. That is a mistake.
@marklampo81642 жыл бұрын
Relying on Pentesting alone is a mistake
@ThoriumHeavyIndustries2 жыл бұрын
@@marklampo8164 The scope of pentest is finding the "most easy" way to compromise. So you are right. But pentest can demonstrate systematic failures failures e.g. poor credential handling by employees for example. Pentest give a good indication of how hard is it to break and if this is hard enough to put it on the internet. If a pentest team works 4 weeks fultime and didn´t find anything than basically I would suggest "yes, put it on the internet" :D
@sudharsanks773 жыл бұрын
I would like to learn more about Vulnerability Management!!! Can you help me?
@AscendTechnologies3 жыл бұрын
Hi Sudharsan...thanks for watching! We have some additional resources here if you'd like to take a look - teamascend.com/services/managed-security/vulnerability-management/