The Five Stages of Vulnerability Management

แชร์
ฝัง
  • เผยแพร่เมื่อ 22 ส.ค. 2024

ความคิดเห็น • 10

  • @TechnologyInterpretersInc
    @TechnologyInterpretersInc 2 ปีที่แล้ว +2

    Great video. Thanks for the information!

  • @mrrishiraj88
    @mrrishiraj88 2 ปีที่แล้ว +2

    Many thanks

  • @bookofyemi
    @bookofyemi ปีที่แล้ว +1

    Nice video

  • @poojavp5214
    @poojavp5214 2 ปีที่แล้ว +1

    Who's the stakeholder for vulnerability management?

    • @anandshinde9941
      @anandshinde9941 2 ปีที่แล้ว +3

      Everyone. The organization to safeguard its assets from attacks. The customer for safety of their data.

  • @sudharsanks77
    @sudharsanks77 3 ปีที่แล้ว

    I would like to learn more about Vulnerability Management!!! Can you help me?

    • @AscendTechnologies
      @AscendTechnologies  3 ปีที่แล้ว

      Hi Sudharsan...thanks for watching! We have some additional resources here if you'd like to take a look - teamascend.com/services/managed-security/vulnerability-management/

  • @ThoriumHeavyIndustries
    @ThoriumHeavyIndustries 2 ปีที่แล้ว

    You rely on scans here. That is a mistake.

    • @marklampo8164
      @marklampo8164 ปีที่แล้ว +1

      Relying on Pentesting alone is a mistake

    • @ThoriumHeavyIndustries
      @ThoriumHeavyIndustries ปีที่แล้ว

      @@marklampo8164 The scope of pentest is finding the "most easy" way to compromise. So you are right. But pentest can demonstrate systematic failures failures e.g. poor credential handling by employees for example. Pentest give a good indication of how hard is it to break and if this is hard enough to put it on the internet. If a pentest team works 4 weeks fultime and didn´t find anything than basically I would suggest "yes, put it on the internet" :D