Vulnerability Management Strategies for Mobile and Remote Devices
“Mobile and remote devices pose an interesting challenge for your vulnerability management program. The foundation of most vulnerability management programs is doing active vulnerability assessments. But devices that aren’t connected to the local network while a vulnerability assessment is taking place are not included.”
As part of Tenable’s Level-up Your IT Security BrandPost initiative on CIO.com, Diane Garey discusses Vulnerability Management Strategies for Mobile and Remote Devices in her blog. She summarizes the current technology and offers several options for keeping mobile devices secure. Check out her article and Tenable’s other contributions to this CIO.com sponsored BrandPost initiative.
- Mobile Security
- Vulnerability Management
Are You Vulnerable to the Latest Exploits?
Enter your email to receive the latest cyber exposure alerts in your inbox.