How are the scanned applications mapped to the existing cmdb applications in AVR
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-21-2022 01:58 AM
How are the scanned applications mapped to the existing cmdb applications in AVR
- Labels:
-
Vulnerability Response
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-23-2022 06:44 PM
@Chris McDevitt, This is one of the fantastic elaborations I had come across irrespective of the topic. I must acknowledge and thank you for the way you narrated and suggested areas that can/should be leveraged. Simply supper !!
Based on your immense practical insight how about publishing a series of white papers in the forum (i already went through the newcomer section)... now I getting more hungry :-))
Many Thanks

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-24-2022 06:07 AM
Keep an eye out for a new white paper on Incomplete Identified IP Devices...

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-23-2022 07:55 PM
you should definitely consider turning this in to a blog Chris !