6
Continuous Testing and Monitoring
Vulnerabilities have become an inescapable part of the life cycle of modern information systems. Rapid software and hardware development and deployment often lead to inadequately tested products. This approach to technology development often results in an amalgamation of potentially vulnerable systems within an organization. Information security professionals must understand that these vulnerabilities are an inherent aspect of information systems that cannot be eliminated. Continuous vigilance through regular technical testing and monitoring is the key to safeguarding these systems.
Continuous testing and monitoring are essential practices in ensuring the security of an organization’s information systems. ...
Get Information Security Handbook - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.