Blog
Topic
Alle
AIoT
SMB Solutions
Products and technologies
Industries
Alle
Retail
Traffic
Education
Logistics
Building
Energy
Manufacturing
Sports
Sustainability
Business trends
Business trends
Cybersecurity
Cybersecurity
Partner and customer experience
Thermal
AI
Events
Access control
Video Intercom
Security Operations
Trends
Solution
LED
Resources and events
IFPD
Virtual Production
Search blog
Blog
Filter
Cancel
Topic
Alle
AIoT
SMB Solutions
Products and technologies
Industries
Alle
Retail
Traffic
Education
Logistics
Building
Energy
Manufacturing
Sports
Sustainability
Business trends
Business trends
Cybersecurity
Cybersecurity
Partner and customer experience
Thermal
AI
Events
Access control
Video Intercom
Security Operations
Trends
Solution
LED
Resources and events
IFPD
Virtual Production
Zurücksetzen
Senden

Roles and Responsibilities in the Vulnerability Management Process

In our white paper, “Understanding Vulnerabilities,” we outline the various stages of the vulnerability disclosure process to help ensure cybersecurity for end users and the integrity of software and technology. It’s important that each participant in the process understands their role and responsibilities. 

 

Security researchers, an important part of the vulnerability management ecosystem, use their skills and tools to find vulnerabilities in software and work with vendors to ensure that patches are effective and made available to end users. For a seamless disclosure process, researchers should work closely and coordinate with vendors so they can communicate with end users and release patches in a timely manner. 

 

Software vendors have three primary responsibilities:

 

1. Building in security to products or software.

2. Responding to the discovery of vulnerabilities or risks.

3. Ensuring that patches and remedies are quickly and clearly communicated and made available to end users.

 

End users have two basic responsibilities:

                              

1. Securing the networks they use.

2. Employing simple practices to ensure the security of their systems.

 

Systems should be placed behind a firewall and VPNs should be used to keep systems from being directly accessible from the internet. End users should use strong passwords and a password manager, use multi-factor authentication whenever possible, and patch their systems quickly and regularly. 

 

Global organizations that understand their role in the vulnerability management and disclosure process can provide greater transparency and foster better security across their enterprise and the internet at large.

 

Visit the Hikvision online Cybersecurity Center for additional resources. 

Diese Website verwendet essentielle Cookies und verwandte Technologien, um Ihre Cookie-Präferenzen zu speichern und Login-Funktionen zu gewährleisten. Mit Ihrem Einverständnis möchten Hikvision und zwei Partner auch optionale Cookies verwenden, um Informationen auf Ihrem Gerät zu speichern und darauf zuzugreifen, einschließlich persönlicher Informationen (z. B. IP-Adressen, Browserinformationen), um das Verkehrsaufkommen und andere Metriken zu beobachten und zu analysieren und um die Inhalte unserer Website anzupassen.

Sie können Ihre Einstellungen jederzeit ändern, indem Sie auf "Cookies verwalten" klicken. Weitere Informationen zu unseren Cookie-Praktiken finden Sie in unserer Cookie-Richtlinie und unserer Datenschutzrichtlinie.

Kontakt
Hik-Partner Pro close
Hik-Partner Pro
Security Business Assistant. At Your Fingertips. Learn more
Hik-Partner Pro
Scan and download the app
Hik-Partner Pro
Hik-Partner Pro

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.