Quantcast
Channel: VioPoint » Scott Thomas
Browsing all 25 articles
Browse latest View live

Making One IT Auditor Seem Like Fifty

I worked for a number of years in a medium sized enterprise and watched as frustrated and overworked auditors asked if a finding had been remediated from a previous audit, or requested systems to...

View Article



Vulnerability Management Is About Continuous Improvement

When starting or improving a vulnerability management program, you may want to leverage a tool to assist you in parsing the sometimes overwhelming amount of data produced when evaluating your...

View Article

Is your Vulnerability Management program enhancing your SIEM?

You may have read Jimmy Vo’s account of starting out as a Security Operations Center analyst on our blog a few days ago. He mentioned integrating vulnerability management solutions like the QualysGuard...

View Article

Offense Is Exciting, But Defense Wins Championships

Many people watched the Super Bowl game recently, pitting the league’s best offense versus the league’s best defense. This was supposed to be the ultimate test of the Denver Broncos’ record-setting...

View Article

Reporting on the Mountain of Vulnerability Data

So you have the vulnerability scanner installed, you’ve run all your scans and you have a giant amount of data to sift through. The next thing that usually happens is that your sponsor starts asking...

View Article


Does Your Vulnerability Management Team Know They’re a Team?

When starting up a Vulnerability Management program, an often overlooked part is creating the team that is responsible for the program. Many times companies focus on the patches that have to be pushed...

View Article

How Are You Monitoring for Vulnerabilities?

A recent Tenable Network Security survey of 400 European companies with over 500 employees included a statistic that was interesting. The survey called “The State Of Metric Based Security” included the...

View Article

Bsides Nashville Launches to an Overwhelmingly Positive Reception

The weekend of May 16 – 18 took me on my first visit to Nashville, TN. I was presenting for the first time this year on “Beating the Infosec Learning Curve Without Burning Out”. This was the first run...

View Article


Your SIEM Should Be Enhancing Your Vulnerability Management Program

A few months ago I wrote, “Is Your Vulnerability Management program Enhancing Your SIEM?” The blog detailed how the vulnerability management program should be feeding the monitoring analysts with data...

View Article


Asset Management Is A Cornerstone Of Vulnerability Management

Many vulnerability programs, I have worked with, understood the value patch management brings to the overall program. The patch is identified, rolled out, and validated that the vulnerability no longer...

View Article

“Madison Avenue – Esqe” Vulnerability : POODLE

An increasing trend in vulnerability disclosure is dubbing each flaw with a catchy name and a Madison Avenue-esqe marketing campaign. We’ve had Shellshock, Heartbleed and new in the last couple weeks,...

View Article

The Frequently Overlooked Security Practice of Configuration Management

In a previous blog post, I discussed how Asset Management is a cornerstone of any good Vulnerability Management program. I’ve also discussed patching in multiple blogs. The area often overlooked during...

View Article

Vulnerability Management vs. Vulnerability Assessment

Item 4 of the SANS 20 Critical Security Controls details the need for a Continuous Vulnerability Assessment and Remediation program. The “and” in this description is the basis for a Vulnerability...

View Article


There’s No Such Thing As A (Patching) Free Lunch

A lot of emphasis has been placed on getting companies to patch timely when a vulnerability is discovered. While “timely” has been debated and may mean different things to different people, it’s...

View Article

Reporting on the Mountain of Vulnerability Data

So you have the vulnerability scanner installed, you’ve run all your scans and you have a giant amount of data to sift through. The next thing that usually happens is that your sponsor starts asking...

View Article


Does Your Vulnerability Management Team Know They’re a Team?

When starting up a Vulnerability Management program, an often overlooked part is creating the team that is responsible for the program. Many times companies focus on the patches that have to be pushed...

View Article

How Are You Monitoring for Vulnerabilities?

A recent Tenable Network Security survey of 400 European companies with over 500 employees included a statistic that was interesting. The survey called “The State Of Metric Based Security” included the...

View Article


Bsides Nashville Launches to an Overwhelmingly Positive Reception

The weekend of May 16 – 18 took me on my first visit to Nashville, TN. I was presenting for the first time this year on “Beating the Infosec Learning Curve Without Burning Out”. This was the first run...

View Article

Your SIEM Should Be Enhancing Your Vulnerability Management Program

A few months ago I wrote, “Is Your Vulnerability Management program Enhancing Your SIEM?” The blog detailed how the vulnerability management program should be feeding the monitoring analysts with data...

View Article

Asset Management Is A Cornerstone Of Vulnerability Management

Many vulnerability programs, I have worked with, understood the value patch management brings to the overall program. The patch is identified, rolled out, and validated that the vulnerability no longer...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images