Part 2: Solving the Top 10 Problems with Vulnerability Management

Security Insights - Cybersecurity for Real-World Workplaces

Security Insights - Cybersecurity for Real-World Workplaces
Part 2: Solving the Top 10 Problems with Vulnerability Management
Apr 25, 2025 Season 5 Episode 50
Ivanti: Cybersecurity and Information Technology Solutions

Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. 

Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business context, overreliance on patch management, and poor metrics and reporting.

Be sure to subscribe to our feed so you never miss an insight from the team.

  • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
Episode Artwork Part 2: Solving the Top 10 Problems with Vulnerability Management 38:32 Episode Artwork Part 1: Solving the Top 10 Problems with Vulnerability Management 32:14 Episode Artwork The Top 10 Problems with Vulnerability Management 34:28 Episode Artwork The Four Big Questions of Cybersecurity 35:05 Episode Artwork Proactive Protection with Exposure Management 36:34 Episode Artwork The Ghosts of Exposure Management Past, Present, and Future 30:04 Episode Artwork Top 5 Tips for Cybersecurity Awareness 26:28 Episode Artwork Vulnerability Intelligence with Securin CEO Ram Movva 22:18 Episode Artwork Avoiding the Costs of a Cyberattack 25:17 Episode Artwork Cyber Defense 202: Exploit Vulnerabilities 31:29 Episode Artwork Cyber Defense 101: Phishing + Credential Attacks 17:44 Episode Artwork Dissecting the Verizon DBIR 27:44 Episode Artwork Chief Scapegoat Officer: How to Keep "Fighting the Good Fight" for Ethical Security Standards 32:42 Episode Artwork Security and Employee Investigations: Breaking Down the Big Brother Security Myth 27:18 Episode Artwork Overemployment Security Concerns: A Risk Versus Remediation Case Study 21:58 Episode Artwork Vulnerability Patch Prioritization Problems: Cybersecurity Research Results (Part Two) 29:27 Episode Artwork Generative AI for Security Teams and Products with JR Robinson from Writer 24:49 Episode Artwork Death, Taxes and Phishing: Cybersecurity Research Results (Part One) 39:54 Episode Artwork Vendor Cyber Risk Management 101: Balancing Supply-Chain Risk with Remote Work DEX and IoT Litter Boxes 43:34 Episode Artwork IT vs Security: When Hackers Patch for Profit 39:49 Episode Artwork Prisoner Priorities: Why Disclosure Policies Can’t Please Everyone 30:14 Episode Artwork Women in Cybersecurity: Personal Experiences and Progress 32:26 Episode Artwork Cloud Security: Indiana Bob’s Server Closet Versus Data Centers 33:05 Episode Artwork See Yourself in Cybersecurity: How 3 Experts Transitioned into InfoSec 27:25 Episode Artwork Phishing Attacks and Marketing Minds: How Hackers Use Unexpected Skills to Break Their Targets 23:04