Vulnerability management entails far more than scanning software and patch deployment, and vulnerabilities often arise from a failure to openly communicate, fully understand, and appropriately resource enterprise risk. In the second article of this three-part series, the authors dive into the risks of external and third-party scanning tools and ways they may be used by unauthorized or unsolicited third parties to identify vulnerabilities.
General Publications
October 28, 2020
“Vulnerability Management: Understanding the Risks of External Scanning,” Cybersecurity Law Report, October 28, 2020.
Media Contact