Essay

 Examine the effectiveness of vulnerability management programs of organizations when utilizing third party vendors for threat intel or vulnerability scanning and/or device patching.  Breach or incident reports are useful for this exercise.  500 words, APA required 

Tags: No tags