2SOURCES OF INFORMATION
To have a successful vulnerability management program, you need information from several data sources. This chapter introduces you to each of these sources. In the next chapter, you’ll see how they all come together to give you a useful vulnerability landscape for your organization.
Asset Information
Despite the importance of asset information, many organizations, large and small, don’t have a full—or even fragmentary—understanding of what is on their networks. Perhaps you use a spreadsheet that you pass among network administrators and update intermittently. Or maybe you have a database of Windows desktops using a CMDB ...
Get Practical Vulnerability Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.