Vulnerability Discovery and Alerting
Now that you have a little more insight into some of the ways you should be overseeing your vulnerability management program, the next step is to begin execution to better understand what vulnerabilities exist within your environment and how to be well informed of the most current vulnerabilities. First, let’s make sure we fully understand how vulnerabilities are tracked and managed.
Vulnerability Overview
You may have noticed that as vulnerabilities are published, they each have a Unique Identifier (UID) to reference the vulnerability, beginning with CVE. CVE stands for Common Vulnerabilities and Exposures and is the standard for vulnerability management, allowing one source to catalog and uniquely identify vulnerabilities. CVE is essentially a list of disclosed vulnerabilities discovered by someone or an organization and made available for the public to review. CVE is operated by the MITRE Corporation and funded by the US Department...