Vulnerability Management at the Crossroads, part II
Iván Arce
Network Security (Elseiver), Volumen 2008, Issue 6, pp. 9-12, http://dx.doi.org/10.1016/S1353-4858(08)70076-X
Date published
information security vulnerability management patch exploits scanning remediation penetration testing


In the previous edition of Network Security (part I), I explored the history of vulnerability management, and concluded that conventional approaches to fighting attack were destined for failure in the light of dynamic and aggressive threat evolution in the modern blackhat community. The bottom line is that vulnerability scanning tools are gradually losing the battle against an attacker community that is becoming faster and more adept at developing zero-day exploits.
This second and final part provides a brief description of how we might reinvent the vulnerability management process.