Vulnerability Management

An Information Security Continuous Monitoring (ISCM) capability that identifies vulnerabilities [Common Vulnerabilities and Exposures (CVEs)] on devices that are likely (more…)

Vulnerability Assessment

Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data (more…)

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source. (more…)