Tag: security
-
Address vulnerability in Qualys report
When you are presented with a long Qualys report PDF, you are expected to work down its long list of vulnerabilities. The task can be long and repetitious. Most network device vulnerabilities are associated with ssl certificates or ssh cryptographic settings. I would judge how good a vendor is by how it addresses the known… Read more