Keeping up with the latest vulnerabilities -- especially in the context of the latest threats -- can be a real challenge. Real-time analysis and proactive response to these new threats is only possible using real-time feeds of the latest and greatest vulnerability data.
But where can you get this data? If you’re relying on a vendor to provide this service, where should they be getting this data?
In no particular order, here are nine key vulnerability data sources for your consideration.