article thumbnail

Measure Security Performance, Not Policy Compliance

The Falcon's View

Examples of security policies-become-KPIs might include metrics around vulnerability and patch management, code defect reduction and remediation, and possibly even phishing-related metrics that are rolled up to the department or enterprise level.

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

They are two different tools, each essential in their own way and critical for chief information security officers (CISOs) to keep their infrastructure safe. Some SCM tools can scan devices and networks for vulnerabilities, track remediation actions, and generate reports on security policy compliance.