Other Vulnerability Management Considerations
Let’s finish off the chapter with some other considerations for your vulnerability management program. Here, we will look at some other areas of importance relating to ensuring vulnerabilities are remediated as soon as possible. We will also review other activities that can be included to improve your vulnerability management program.
Hardware Vulnerabilities
One area that can be overlooked is vulnerabilities with any hardware within your organization. Vulnerabilities such as Meltdown and Spectre are prime examples of this (you can learn more about Meltdown and Spectre here: https://www.cisa.gov/news-events/alerts/2018/01/04/meltdown-and-spectre-side-channel-vulnerability-guidance). Your hardware is not just limited to your end-user devices but any infrastructure that you have in place, such as network equipment, servers, IoT, etc. Over the years, we have invested heavily in the software side of security, but recently, the...