
All systems contain vulnerabilities. They may take the form of a configuration issue for system administrators to resolve, software defects requiring a vendor update, or even a vulnerability that the vendor doesn’t yet know exists, for which a mitigation isn’t available.
An effective vulnerability management process allows your organisation to understand and validate on a regular basis, which vulnerabilities are present in your estate and to actively reduce risk. It also allows you to react quickly when a critical vulnerability is disclosed, by helping you understand your organisation’s exposure to it.
Cybersecurity vulnerability management is the continuous process of identifying, evaluating, prioritising and mitigating security weaknesses (vulnerabilities) in your organisation’s systems, networks and applications before attackers can exploit them.