Mark Lanterman (mlanterman@compforensics.com) is Chief Technology Officer at Computer Forensic Services Inc. in Minnetonka, MN.
Part 3 of this article appeared in the January 2018 issue of Compliance & Ethics Professional.
As discussed in my previous three articles, strong security programs comprise both defensive and offensive measures. Maturity assessments, security assessments, security auditing, and technical vulnerability scanning are all defensive measures. However, since vulnerability scanners are often used by cybercriminals in an effort to find and exploit vulnerabilities, technical vulnerability scanning is both offensive and defensive.