The traditional approach to vulnerability management is to scan systems and applications for weaknesses at certain intervals. These intervals could be anything from yearly, quarterly or even monthly scans. The problem with this approach is that the organisation only has visibility of the vulnerabilities detected at those particular points in time.
What is required is a comprehensive and continuous vulnerability management program tightly coupled with other essential operational security processes such as asset management, patch management and incident response. Download the Whitepaper: Implementing an Effective Vulnerability Management Program.
Upon accessing this you will also be provided with the recent webinar recording "Back to Basics: Best Practices for Vulnerability Assessments (VA)" where Colin West discusses in detail how to plan an effective VA.