The components of strong cybersecurity plans, Part 4: Technical vulnerability scanning

Mark Lanterman (mlanterman@compforensics.com) is Chief Technology Officer at Computer Forensic Services Inc. in Minnetonka, MN.

Part 3 of this article appeared in the January 2018 issue of Compliance & Ethics Professional.

As discussed in my previous three articles, strong security programs comprise both defensive and offensive measures. Maturity assessments, security assessments, security auditing, and technical vulnerability scanning are all defensive measures. However, since vulnerability scanners are often used by cybercriminals in an effort to find and exploit vulnerabilities, technical vulnerability scanning is both offensive and defensive.

This document is only available to members. Please log in or become a member.
 


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field