December 29, 2006
Author(s)
Peter M. Mell, Karen Kent Scarfone, Sasha Romanosky
Organizations struggle to assess the relative importance of software vulnerabilities across disparate hardware and software platforms. They must prioritize vulnerabilities and remediate those that pose the greatest risk. However, most software vendors and