Keeping up with the latest vulnerabilities -- especially in the context of the latest threats -- can be a real challenge.

Sean Martin, CISSP | President, imsmartin

October 20, 2016

10 Slides

Keeping up with the latest vulnerabilities -- especially in the context of the latest threats -- can be a real challenge. Real-time analysis and proactive response to these new threats is only possible using real-time feeds of the latest and greatest vulnerability data.

But where can you get this data? If you’re relying on a vendor to provide this service, where should they be getting this data?

In no particular order, here are nine key vulnerability data sources for your consideration.

 

About the Author(s)

Sean Martin

CISSP | President, imsmartin

Sean Martin is an information security veteran of nearly 25 years and a four-term CISSP with articles published globally covering security management, cloud computing, enterprise mobility, governance, risk, and compliance—with a focus on specialized industries such as government, finance, healthcare, insurance, legal, and the supply chain

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights