2/1/08
Vulnerability Management Lifecycle (Part 1 of...
by Shon Harris, CISSP, MCSE Information security is a new business process that needs to be understood and implemented from the top of an organization on down. Vulnerability management is one important component of information security. Proper vulnerability management is an integration of people, processes,<br /><br />Posted in <strong><a rel="nofollow" target="_blank" href="http://technorati.com/blogs/http://cisspblog.logicalsecurity.com">Certified Information Systems Security Professional</a></strong> (<a rel="nofollow" target="_blank" href="http://technorati.com/search/http%3A%2F%2Fcisspblog.logicalsecurity.com" style="color:#390;"><img src="http://static.technorati.com/images/bubble_h11.gif" alt="View Technorati URL search" style="border:none;"/> 0 links from 0 sites</a>) <br /><br /><img width="1" height="1" src="http://static.technorati.com/y/391287307.gif?anM9MCZyZWY9YXBpfC9zZWFyY2g/cXVlcnk9bWFsd2FyZSZsYW5ndWFnZT1lbiZrZXk9YmYyMjQ5ZjVhOTRmMzY1MmZjNjc0ODBjZWExYjg0MjQmZm9ybWF0PXJzc3wyMHxodHRwOi8vY2lzc3BibG9nLmxvZ2ljYWxzZWN1cml0eS5jb20vMjAwOC8wMi8wMS92dWxuZXJhYmlsaXR5LW1hbmFnZW1lbnQtbGlmZWN5Y2xlLyZ2aXNpdG9yaWQ9LSZ1c2VyaWQ9LSZzZXNzaW9uaWQ9NzA1Y2VjNTUzMGZjOTljNTBlNDNhZDQ1NGUxNGYxNjgmdXNlcmNsYXNzPTEmYWJjbGFzcz1iJmFic3dpdGNoPWMmbWVtYmVyPS0="/>