© Eric C. Thompson 2020
E. C. ThompsonDesigning a HIPAA-Compliant Security Operations Centerhttps://doi.org/10.1007/978-1-4842-5608-4_4

4. Vulnerability Management

Eric C. Thompson1 
(1)
Dekalb, IL, USA
 

Breaches occur because vulnerabilities are exploited. It does not mean attackers used complex, undetectable zero-day exploits to compromise a system and exfiltrate data. It does mean that a weakness existed, an attacker took advantage of it, and the activities went undetected. A successful breach against an organization also does not always mean incompetence or negligence was the root cause. Sometimes organizations with mature processes and talented staff suffer breaches. Sometimes there are just too many variables and too much noise.

Security operations ...

Get Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.