“Prediction is difficult, especially if it is about the future.”

This is why we do detect and response.

image.png

Technical Vulnerability

A flaw in Hardware, software, firmware, etc. that leaves the information processing system open for potential exploitation.

Technical Vulnerability Management

Is the practice of mitigating and/or preventing the exploitation of technical vulnerabilities.

This process involves:

  1. Identification
  2. Classification
  3. Remediation
  4. Mitigation

This is practiced together with risk management and is an integral part of cybersecurity.

image.png

Detect

Discover

Discover known vulnerabilities. These are some of the most important ways to get information about known vulnerabilities in software, hardware and networking devices.

image.png

Scan