The IT Law Wiki

Overview[]

Vulnerability management underlies risk management. Once vulnerabilities are discovered, the corresponding risk must be either mitigated or accepted.[1]

References[]