Vulnerability assessment steps, process explained

July 8, 2020 | Nick Cavalancia
Nick Cavalancia

Nick Cavalancia

Nick Cavalancia is a Microsoft Cloud and Datacenter MVP, has over 25 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, Master CNI. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.

July 8, 2020 | Nick Cavalancia

Vulnerability assessment steps, process explained

This blog was written by a third party author What is a vulnerability assessment? Vulnerability assessment is the process of defining, identifying, classifying, and prioritizing vulnerabilities in systems, applications, and networks. It provides an organization with the needed visibility into the risks that exist concerning external threats designed to take advantage of vulnerabilities. At a tactical level, the vulnerability assessment…

July 2, 2020 | Nick Cavalancia

Vulnerability management explained

This blog was written by a third party author. What is vulnerability management? Every year, thousands of new vulnerabilities are discovered, requiring organizations to patch operating systems (OS) and applications and reconfigure security settings throughout the entirety of their network environment. To proactively address vulnerabilities before they are utilized for a cyberattack, organizations serious about the security of their environment…

Get the latest security news in your inbox.

Subscribe via Email

June 23, 2020 | Nick Cavalancia

Managed security operations center (SOC) explained

This blog was written by a third party author and does not reflect the opinions of AT&T. What is a managed SOC and how does it work? Managed SOC, also known as SOC as a Service, is a subscription-based offering whereby organizations outsource threat detection and incident response. Based on the concept of turning an internal security operations…