Chapter 7. Vulnerability Management
Introduction
Back in the good old days, the typical approach to vulnerability management was to have the security group identify threats and then “toss” them to information technology (IT) administrators for remediation. As the number of security threats mounted over the years, this casual approach was no longer viable. In previous chapters, we discussed vulnerability ...
Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.