Director Of Information Technology in Healthcare and Biotech3 years ago
As soon as we become aware of the vulnerabilities. Most of the time adding patches and security updates.
Vice President Information Technology in Finance (non-banking)3 years ago
Micro segmentation is relatively best way.
Content you might like
With Gartner highlighting the urgency of post-quantum cryptography (PQC), I would like to know if there are other members of the group already involved in the discussion or in the planning to face the threat of attacks like 'harvest-now, decrypt-later'?
How are you diversifying threat intelligence sources? Have you been able to reduce reliance on CISA for TI?
Is footprinting an effective way to do vulnerability management?
Very effective1%
Somewhat effective52%
Slightly effective31%
Slightly ineffective8%
Somewhat ineffective3%
Not at all effective
Not sure yet1%
View Results
How are companies doing Unified Vulnerability Management? The idea is bringing all inputs (AppSec, DevSecOps, VM scanning, asset discovery etc) into one platform. Instead of creating a homegrown solution, are there vendors that do this well?
As soon as we become aware of the vulnerabilities. Most of the time adding patches and security updates.