Climbing the Vulnerability Management Mountain: Taking the First Steps Towards Enlightenment

Just as you would map a hike or climb by creating waypoints you plan to hit each day, you must plan your vulnerability management process by creating similar goals. We call these goals Maturity Levels, from ML0 to ML5, as we defined them in the last blog. You have your asset inventory from an open-source […]… Read More


This is a companion discussion topic for the original entry at https://www.tripwire.com/state-of-security/vulnerability-management/climbing-vulnerability-management-mountain-ml0/