Why vulnerability management is a continuous process
Scan types and when to use them
Remediation workflow and SLAs
Key Takeaways
TL;DR
Vulnerability management is continuous — not a one-time scan. New CVEs are published daily.
Cyber Defense Agent provides continuous external vulnerability scanning of your public-facing assets.
Combine external scans (CDA) with internal authenticated scans for complete coverage.
Define and enforce remediation SLAs: Critical within 48 hours, High within 7 days, Medium within 30 days.
Prioritize using CVSS scores, CISA KEV catalog, asset criticality, and exposure level.
FAQ
Frequently asked questions
How often should we run vulnerability scans?
External scans should run continuously (Cyber Defense Agent does this automatically). Internal scans should run monthly for critical systems and quarterly for all assets. PCI DSS requires quarterly external scans by an Approved Scanning Vendor (ASV). Web application scans should run quarterly or after any significant code changes.
What is the difference between vulnerability scanning and penetration testing?
Vulnerability scanning is automated and identifies known vulnerabilities across your environment. Penetration testing is a manual, targeted exercise where a skilled tester attempts to exploit vulnerabilities and chain them together to demonstrate real-world attack paths. Both are important: scanning provides breadth and frequency, penetration testing provides depth and context. Most frameworks require both.
Does Cyber Defense Agent replace the need for internal vulnerability scanning?
No. Cyber Defense Agent scans your external attack surface — internet-facing assets, DNS, email authentication, SSL/TLS, and exposed services. Internal vulnerability scanning covers assets behind your firewall (workstations, servers, internal applications) that CDA cannot reach. You need both external and internal scanning for a complete program.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.