Feeds

The Register Guide to securing your network

Showing our vulnerability side

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

From time to time we ask our analyst friends at Freeform Dynamics to compose a primer on a tech topic du jour. Today, we focus on vulnerability management, a crucial component in every IT security strategy.

Vulnerability management is largely about ‘divide and conquer’ - identifying the critical systems that should be treated, assessing them, prioritising the results and dealing with them in some way, according to Freeform analyst Jon Collins, who wrote this paper.

But vulnerability management is easier preached than practiced. For a start – and this is not an easy start – you need to know what you have in your environment. Without this knowledge, it is impossible to assess the risk.

The author seeks to answer the following questions about vulnerability management:

  • What is it?
  • Why should you be thinking about it?
  • What can you do about it?
  • What else should you consider?

The Register Guide to securing your network is five pages long and a straightforward read. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.