Geek-Guy.com

Category: CSO and CISO, IT Leadership, Threat and Vulnerability Management

10 best practices for vulnerability management according to CISOs

It was 2003, and I was giving my first cybersecurity presentation at an industry conference in Chicago. I talked about the onslaught of worms and viruses at the time (MSBlast, SQLSlammer, etc.), and stressed the importance of strong vulnerability and patch management to the audience. When it came time for the Q&A, an audience member…

WordPress Appliance - Powered by TurnKey Linux