dcsimg

Writing Security Advisories: 5 Best Practices For Vendors

To maximize the impact of your security advisories, here are some key steps vendors can take to support automated workflows and timely remediation efforts.

Over the years we’ve seen every variation of security advisory imaginable: plain text, good HTML, bad HTML, machine readable, machine readable with giant blobs of embedded text (which potentially negates the value of the machine readable parts).

Read More

Source: https://www.tenable.com

https://www.tenable.com