Share on LinkedInTweet about this on TwitterShare on FacebookEmail this to someonePin on Pinterest
Read on Mobile

Defining Vulnerability Risk Management (and How to Build a Modern VRM Program)

researchHQ’s Key Takeaways:

  • Modern security teams must take a holistic approach to risk management to secure vulnerabilities across their entire attack surface
  • Sophisticated vulnerability risk management demands visibility across traditional IT infrastructures, cloud and other virtualised environments.
  • Monitoring and testing web applications are crucial to securing against malicious attacks.
  • Automation enables faster and more efficient vulnerability patching and remediation.


Once upon a time (just a handful of years ago), vulnerability management programs focused solely on servers, running quarterly scans that targeted only critical systems.

But that was then, and you can’t afford such a limited view in the now. Truth is, vulnerability exploitation now happens indiscriminately across the modern attack surface—from local and remote endpoints to on-prem and cloud infrastructure to web applications and containers. Security teams must start thinking about their organization’s risk more holistically, since their adversaries will take advantage of any available entryway into the network. In short—attackers aren’t siloed in their approach, so you shouldn’t be siloed in yours.

A logical first step? Expanding the way you think about vulnerability risk management to not just include traditional IT infrastructure, but also cloud-based or virtualized assets and applications. Let’s dive deeper into the VRM considerations for each layer.

Enhancing vulnerability management—on-prem and in the cloud
Today, your security team has more on its plate than ever before. You’re tasked with monitoring a vast attack surface, including systems and software in corporate data centers and on cloud platforms, running in physical, virtualized, and container environments.

Your vulnerability management solution should be able to keep pace with these ever-increasing demands for visibility. On top of protecting critical infrastructure that keeps the network in motion, it should also work with DHCP connections, VMware, AWS, Azure, and other virtual and cloud platforms. For many teams who are increasing their cloud adoption, a primary goal is to eliminate blind spots in your environment by integrating with cloud platforms, detecting when new devices are deployed, and automatically assessing them.

You can take another step in this direction by embedding agents in cloud and virtual images, so that every time a new component of a service is spun up you get instant visibility into the risk it introduces into your network.

Read more…

Business Challenge:We've curated the most common business challenges Monitoring vulnerabilities across IT infrastructure
Stage:We've split the research process into 3 tasks Identify Problems and Explore Solutions

Latest Additions