Vulnerability management tools: Dos and don'ts

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

Avoid common vulnerability management errors and get the most out of your tools

DON'T shortchange remediation. Surprisingly, organizations will perform vulnerability scans, or hire someone to conduct a scan, get a report and then not follow through. They may cherry-pick one or two critical items and neglect the rest. The result is that the organization has spent time and money without doing much for its security.

"Some organizations stop at detection as an end point," says Chenxi Wang, a principal Forrester analyst. "That tells you where you are, but doesn't do much for your risk posture."

Also read the companion article Vulnerability management keeps getting sexier

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies