Blog
Topic
All
Products and technologies
Business trends
Cybersecurity
Cybersecurity
Awards
AI
ColorVu
Events
NVR
Access control
Solution
Software
Industry News
Company News
Product Announcement
Videos
Case Studies
Search blog
Blog
Filter
Cancel
All
Products and technologies
Business trends
Cybersecurity
Cybersecurity
Awards
AI
ColorVu
Events
NVR
Access control
Solution
Software
Industry News
Company News
Product Announcement
Videos
Case Studies
Reset
Submit

Cybersecurity: Roles and Responsibilities in the Vulnerability Management Process 

As we discussed in our recent white paper, “Understanding Vulnerabilities,” following the various stages of the vulnerability disclosure process helps ensure cybersecurity for end users and the integrity of software and technology. It’s important that each participant in the process understands their role and responsibilities. 

Security researchers, an important part of the vulnerability management ecosystem, use their skills and tools to find vulnerabilities in software and work with vendors to ensure that patches are effective and made available to end users. For a seamless disclosure process, researchers should work closely and coordinate with vendors so they can communicate with end users and release patches in a timely manner. 

Software vendors have three primary responsibilities:

  • Building in security to products or software.
  • Responding to the discovery of vulnerabilities or risks.
  • Ensuring that patches and remedies are quickly and clearly communicated and made available to end users.

End users have two basic responsibilities: securing the networks they use and employing simple practices to ensure the security of their systems. Systems should generally be placed behind a firewall and VPNs should be used to keep systems from being directly accessible from the internet. End users should use strong passwords and a password manager, use multi-factor authentication whenever possible, and patch their systems quickly and regularly. 

Global organizations that understand their role in the vulnerability management and disclosure process can provide greater transparency and foster better security across their enterprise and the internet at large.

Download our white paper to read more about vulnerability management. Visit the Hikvision online Cybersecurity Center for additional resources.

Subscribe to newsletter

Subscribe to our email newsletter to get the latest, trending content from Hikvision

Hikvision.com uses strictly necessary cookies and related technologies to enable the website to function. With your consent, we would also like to use cookies to observe and analyse traffic levels and other metrics / show you targeted advertising / show you advertising on the basis of your location / tailor our website's content. For more information on cookie practices please refer to our cookie policy.

 

Contact Us
back to top

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.