Title
Vulnerability Management at the Crossroads, part II
Authors
Iván Arce
In
Network Security (Elseiver), Volumen 2008, Issue 6, pp. 9-12, http://dx.doi.org/10.1016/S1353-4858(08)70076-X
Date published
2008-06-10
Keywords
information security vulnerability management patch exploits scanning remediation penetration testing

Abstract

In the previous edition of Network Security (part I), I explored the history of vulnerability management, and concluded that conventional approaches to fighting attack were destined for failure in the light of dynamic and aggressive threat evolution in the modern blackhat community. The bottom line is that vulnerability scanning tools are gradually losing the battle against an attacker community that is becoming faster and more adept at developing zero-day exploits.
This second and final part provides a brief description of how we might reinvent the vulnerability management process.