1. 918博天堂·(中国区)首页

      Blog
      Topic
      All
      AIoT
      SMB Solutions
      Products and technologies
      Industries
      All
      Retail
      Traffic
      Education
      Logistics
      Banking
      Building
      Energy
      Manufacturing
      Sports
      Sustainability
      Business trends
      Cybersecurity
      Cybersecurity
      Partner and customer experience
      Deep learning
      Thermal
      AI
      Events
      Access control
      Video Intercom
      Security Operations
      Trends
      Solution
      LED
      Resources and events
      IFPD
      Search blog
      Blog
      Filter
      Cancel
      Topic
      All
      AIoT
      SMB Solutions
      Products and technologies
      Industries
      All
      Retail
      Traffic
      Education
      Logistics
      Banking
      Building
      Energy
      Manufacturing
      Sports
      Sustainability
      Business trends
      Cybersecurity
      Cybersecurity
      Partner and customer experience
      Deep learning
      Thermal
      AI
      Events
      Access control
      Video Intercom
      Security Operations
      Trends
      Solution
      LED
      Resources and events
      IFPD
      Reset
      Submit

      Roles and Responsibilities in the Vulnerability Management Process

      In our white paper, “Understanding Vulnerabilities,” we outline the various stages of the vulnerability disclosure process to help ensure cybersecurity for end users and the integrity of software and technology. It’s important that each participant in the process understands their role and responsibilities. 

       

      Security researchers, an important part of the vulnerability management ecosystem, use their skills and tools to find vulnerabilities in software and work with vendors to ensure that patches are effective and made available to end users. For a seamless disclosure process, researchers should work closely and coordinate with vendors so they can communicate with end users and release patches in a timely manner. 

       

      Software vendors have three primary responsibilities:

       

      1. Building in security to products or software.

      2. Responding to the discovery of vulnerabilities or risks.

      3. Ensuring that patches and remedies are quickly and clearly communicated and made available to end users.

       

      End users have two basic responsibilities:

                                    

      1. Securing the networks they use.

      2. Employing simple practices to ensure the security of their systems.

       

      Systems should be placed behind a firewall and VPNs should be used to keep systems from being directly accessible from the internet. End users should use strong passwords and a password manager, use multi-factor authentication whenever possible, and patch their systems quickly and regularly. 

       

      Global organizations that understand their role in the vulnerability management and disclosure process can provide greater transparency and foster better security across their enterprise and the internet at large.

       

      Visit the Hikvision online Cybersecurity Center for additional resources. 

      Contact Us
      Hik-Partner Pro close
      Hik-Partner Pro
      Hik-Partner Pro
      Scan and download the app
      Download
      Hik-Partner Pro
      Hik-Partner Pro

      Get a better browsing experience

      You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.