Security School

Performing an authenticated vulnerability scan

This Security School is a free multimedia learning guide designed to help you understand and address the strategic and tactical implications of this topic.

Debunking the myths of authenticated vulnerability scans

When it comes to authenticated vulnerability scans, there are many misunderstandings about the technology that leave organizations wary. Security expert Kevin Beaver explains what to expect from your scans.

FROM THE SECURITY SCHOOL:

Performing an authenticated vulnerability scan

SECURITY SCHOOL SECTIONS

  1. Learning links
  2. Quiz
+ Show More

When it comes to authenticated vulnerability scanning, there are many misunderstandings that have been passed off as truths, leaving many organizations and individuals wary of the task at hand. In this podcast, information security expert Kevin Beaver aims to set the story straight.

For example, do you know the difference between vulnerability scanning and penetration testing? Did you know that there is a significant amount of planning that needs to be done in advance in order to improve (and ease) the authenticated vulnerability scanning process? Or that just because a vulnerability is found doesn't mean it is truly a vulnerability your organization should be worried about?

Listen into this exclusive podcast now to learn all nine myths, misconceptions and oversights about authenticated vulnerability scanning.

About the author:
Kevin Beaver is an information security consultant, writer, professional speaker and expert witness at Atlanta-based Principle Logic, LLC, and author of several books on information security, including the best-selling Hacking For Dummies. In addition, he's the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go. You can reach Kevin through his website www.principlelogic.com and follow him on Twitter at @kevinbeaver.

Next Steps

View SearchSecurity's handbook on vulnerability management programs

Learn how to hone an effective vulnerability management program

This was first published in August 2014

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Security School

Performing an authenticated vulnerability scan

SECURITY SCHOOL SECTIONS

  1. Learning links
  2. Quiz
Related Discussions

Kevin Beaver, Network Security asks:

What myths or misunderstandings have you heard about authenticated vulnerability scanning?

0  Responses So Far

Join the Discussion

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close