<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability management aggregation tools in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/39508#M2969</link>
    <description>&lt;P&gt;To update your list, add NorthStar:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.northstar.io/how-it-works/" target="_blank"&gt;https://www.northstar.io/how-it-works/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 25 Sep 2020 18:08:29 GMT</pubDate>
    <dc:creator>TPAASYCC</dc:creator>
    <dc:date>2020-09-25T18:08:29Z</dc:date>
    <item>
      <title>Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/16477#M620</link>
      <description>&lt;P&gt;So following a discussion launched on another social media platform, I compiled a list of what tools folk were advocating over at&amp;nbsp;&lt;A href="https://github.com/kempy007/VulManAgg" target="_blank"&gt;https://github.com/kempy007/VulManAgg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the crux of the conversation was;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ember-view"&gt;&lt;SPAN&gt;"Application security vulnerability management - which tool do you find the most useful to store, manage, and prioritize vulnerabilities? &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="ember-view"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ember-view"&gt;&lt;SPAN&gt;...&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ember-view"&gt;&lt;SPAN&gt;I'd like to hear some honest feedback from those who have implemented these solutions. PLEASE no sales pitches or solicitation."&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ember-view"&gt;&lt;SPAN&gt;Some of the tools claim to be able to pull in Application scans and Network scans and even Source Code scans and to output to multiple defect tracking tools.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;So my question is have I missed any worth noting, and what are your experiences with the ones you have used.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:01:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/16477#M620</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2023-10-09T09:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/16499#M628</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You might have to check the&amp;nbsp;link you&amp;nbsp;included; it opens a page on GITHub that displays&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;404 This is not the&amp;nbsp;web page you are looking for.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 11:22:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/16499#M628</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-11-19T11:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/16501#M629</link>
      <description>A space got included &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;</description>
      <pubDate>Mon, 19 Nov 2018 12:33:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/16501#M629</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2018-11-19T12:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/17113#M711</link>
      <description>&lt;P&gt;We wrote our own tool.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Dec 2018 20:44:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/17113#M711</guid>
      <dc:creator>DHerrmann</dc:creator>
      <dc:date>2018-12-18T20:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/17163#M722</link>
      <description>&lt;P&gt;You know sharing is caring!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Care to spill the details, which components did you elect to use and why.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it improve asset management, is it part of a GRC tool.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why did you write your own tool, was there a lack of choice?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 08:48:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/17163#M722</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2018-12-20T08:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/17185#M724</link>
      <description>&lt;P&gt;Hi - nope, it's not a part of Archer of any other GRC tool.&amp;nbsp; &amp;nbsp;It was written by one of our teams.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All vulns found are loaded into a database (I think it's MS SQL Server), and a front-end was written.&amp;nbsp; &amp;nbsp;All vulnerabilities are assigned a "traunch" based on their CVSS/CVE score, internal vs external, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This makes it very easy to determine if remediation is overdue and we can collect really good stats to help us determine who needs "encouragement" to remediate on-time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't share a ton of details, but that high level view should help you know where we're coming from.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 19:55:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/17185#M724</guid>
      <dc:creator>DHerrmann</dc:creator>
      <dc:date>2018-12-20T19:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/19682#M929</link>
      <description>&lt;P&gt;If you can share a schema and BPMN&amp;nbsp;chart it would be helpful to others.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 09:05:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/19682#M929</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2019-03-04T09:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/19706#M930</link>
      <description>&lt;P&gt;Can't.&amp;nbsp; &amp;nbsp;It's proprietary - company intellectual property.&amp;nbsp; &amp;nbsp;Sorry.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 16:32:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/19706#M930</guid>
      <dc:creator>DHerrmann</dc:creator>
      <dc:date>2019-03-04T16:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability management aggregation tools</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/39508#M2969</link>
      <description>&lt;P&gt;To update your list, add NorthStar:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.northstar.io/how-it-works/" target="_blank"&gt;https://www.northstar.io/how-it-works/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2020 18:08:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerability-management-aggregation-tools/m-p/39508#M2969</guid>
      <dc:creator>TPAASYCC</dc:creator>
      <dc:date>2020-09-25T18:08:29Z</dc:date>
    </item>
  </channel>
</rss>

