Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
Most Risk-Based Vulnerability Management Programs are Ineffective

Request Your Free Research Report Now:

"Most Risk-Based Vulnerability Management Programs are Ineffective"

Pulse and Vulcan Cyber surveyed 200 technology IT security decision-makers to find out how vulnerability risk is prioritized, managed and reduced.

Eighty-six percent of enterprise IT and security executives surveyed rely on third-party vulnerability severity data to prioritize vulnerabilities with an additional 70% relying on third-party threat intelligence. This underscores a concerning trend identified in a majority of cyber security organizations today, with a majority relying heavily on measures and data from external sources that lack the necessary context to effectively inform and prioritize cyber risk specific to their business unit or enterprise service. Get the full survey and infographic here.


Offered Free by: Vulcan Cyber
See All Resources from: Vulcan Cyber

Recommended for Professionals Like You: