Vulnerability management tools: Dos and don'ts
<strong>DON'T shortchange remediation.</strong> Surprisingly, organizations will perform vulnerability scans, or hire someone to conduct a scan, get a report and then not follow through. They may cherry-pick one or two critical items and neglect the rest. The result is that the organization has spent time and money without doing much for its security.