© Morey J. Haber, Brad Hibbert 2018
Morey J. Haber and Brad HibbertAsset Attack Vectorshttps://doi.org/10.1007/978-1-4842-3627-7_11

11. Remediation

Morey J. Haber1  and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 

While the cyber security community struggles with identifying vulnerabilities, classifying them, and providing remediation, vendors have taken on the problem with their own methodologies, service-level agreements, and public disclosure policies. As we have seen, it is one thing to identify a vulnerability and an entirely different problem to apply a remediation or mitigation strategy. To compound the problem, vendor implementations of public disclosure vary greatly, and the technologies they implement, even on similar ...

Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.