Talk With an Expert

Implementing a Vulnerability Management Process

Implementing a Vulnerability Management Process (PDF, 2.41MB)Published: 09 Apr, 2013
Created by
Tom Palmaers

This paper looks at how a vulnerability management (VM) process could be designed and implemented within an organization. Articles and studies about VM usually focus mainly on the technology aspects of vulnerability scanning. The goal of this study is to call attention to something that is often overlooked: a basic VM process which could be easily adapted and implemented in any part of the organization.