Performing an authenticated vulnerability scan
This Security School is a free multimedia learning guide designed to help you understand and address the strategic and tactical implications of this topic.
When it comes to authenticated vulnerability scanning, there are many misunderstandings that have been passed off as truths, leaving many organizations and individuals wary of the task at hand. In this podcast, information security expert Kevin Beaver aims to set the story straight.
For example, do you know the difference between vulnerability scanning and penetration testing? Did you know that there is a significant amount of planning that needs to be done in advance in order to improve (and ease) the authenticated vulnerability scanning process? Or that just because a vulnerability is found doesn't mean it is truly a vulnerability your organization should be worried about?
Listen into this exclusive podcast now to learn all nine myths, misconceptions and oversights about authenticated vulnerability scanning.
About the author:
Kevin Beaver is an information security consultant, writer, professional speaker and expert witness at Atlanta-based Principle Logic, LLC, and author of several books on information security, including the best-selling Hacking For Dummies. In addition, he's the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go. You can reach Kevin through his website www.principlelogic.com and follow him on Twitter at @kevinbeaver.
View SearchSecurity's handbook on vulnerability management programs
Learn how to hone an effective vulnerability management program
Kevin Beaver, Network Security asks:
What myths or misunderstandings have you heard about authenticated vulnerability scanning?
0 ResponsesJoin the Discussion