8 keys to more effective vulnerability management

Read Time:29 Second

CISOs preach the need to get security fundamentals right, yet many still struggle to build a rock-solid vulnerability management program.

They can be stymied by the volume of vulnerabilities that need attention, or the pace required to address them, or the resources required to be effective.

Consider, for instance, the challenges that security teams had in addressing the Log4j vulnerabilities. A recent survey from (ISC)², a nonprofit association of certified cybersecurity professionals, found that 52% of respondents spent weeks or more than a month remediating Log4j.

To read this article in full, please click here

Read More