In this edition of IT Security Gumbo, we'll cover threat and vulnerability management. We introduce you to the core components of comprehensive vulnerability as
Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks. Bugs: they're everywhere. Soft
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the reader through the entire vulnerability management lifecycle and includes frameworks such as O
“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.” –Nate Miller, Cofounder, Stratum Securi
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic