Stay up to date on the latest cyber advice and warnings.

Cybersecurity Blog

Automated Vulnerability Scanning – Do You Know Your Weaknesses? [Podcast]

automated vulnerability scanning

One of the big shifts in cybercrime, and the cyber criminals behind it, over the past 20 years has been from manual to automated processes. Where cyberattacks used to require hands on a keyboard and took a considerable amount of time to execute and complete, today’s cybercrime is mostly the provenance of automated systems. Automated vulnerability scanning is routinely and constantly deployed to identify potential weak points in network infrastructure.

As of yet, very little that has been tried to reduce these activities has been successful, and there does not appear to be much faith in the cybersecurity world that we will ever be able to reduce this kind of automated reconnaissance. So what is a business to do? In this episode, we discuss the impact that constant automated vulnerability scanning has on the security world, and how small businesses can try to use this type of scanning to identify any weaknesses before cybercriminals can exploit them.

For more information, resources, and a transcript of this episode, check out the original post.