BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
The gaping hole in your vulnerability management program
Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan. Watch Now
Running vulnerability assessments and scans are critical enterprises practices that will help security teams not only find weaknesses and points of failure but also ensure the correct patches and updates are made.
While many organizations perform vulnerability scans, they often only run external or unauthenticated scans, omitting the other side of the vulnerability scanning equation: authenticated vulnerability scans.
This Security School lesson featuring information security expert Kevin Beaver offers guidance on how to perform an authenticated vulnerability scan to complete your vulnerability management program, as well as the truths behind many authenticated vulnerability scanning misconceptions.
Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².
View our Security School Course Catalog to view more lessons eligible for CPE credits.
About the presenter: Kevin Beaver is an information security consultant, writer, professional, speaker and expert witness with Atlanta-based Principle Logic LLC. With more than 25 years of experience in the industry, Kevin specializes in performing independent security vulnerability assessments of network systems, as well as Web and mobile applications.
1Test your authenticated vulnerability scanning knowledge
After watching the video, reading the tip and listening to the podcast, test what you've learned about authenticated vulnerability scanning with this exclusive quiz.