<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The Ins and Outs of Vulnerability Scanning</title>
	<atom:link href="http://www.gfi.com/blog/ins-outs-vulnerability-scanning/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/ins-outs-vulnerability-scanning/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ins-outs-vulnerability-scanning</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: The Venom Man</title>
		<link>http://www.gfi.com/blog/ins-outs-vulnerability-scanning/comment-page-1/#comment-25400</link>
		<dc:creator>The Venom Man</dc:creator>
		<pubDate>Mon, 14 Mar 2011 07:16:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3122#comment-25400</guid>
		<description><![CDATA[After the vulnerability scan, one must also do Vulnerability Assessment. This method counts and grades / categorizes (or gives importance) to system vulnerabilities. 

In the past, Vulnerability Assessment was only used to energy and transportation systems. However, at present, it is also applied to IT.  

In a way, Vulnerability Assessment and Vulnerability Scanning are almost the same, as the former can also identity against known vulnerabilities.]]></description>
		<content:encoded><![CDATA[<p>After the vulnerability scan, one must also do Vulnerability Assessment. This method counts and grades / categorizes (or gives importance) to system vulnerabilities. </p>
<p>In the past, Vulnerability Assessment was only used to energy and transportation systems. However, at present, it is also applied to IT.  </p>
<p>In a way, Vulnerability Assessment and Vulnerability Scanning are almost the same, as the former can also identity against known vulnerabilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Peter</title>
		<link>http://www.gfi.com/blog/ins-outs-vulnerability-scanning/comment-page-1/#comment-21832</link>
		<dc:creator>Peter</dc:creator>
		<pubDate>Mon, 21 Feb 2011 02:20:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3122#comment-21832</guid>
		<description><![CDATA[I would also like to add to look for scanning solutions that offer free automatic updates, so users will never have a chance to say later. :)]]></description>
		<content:encoded><![CDATA[<p>I would also like to add to look for scanning solutions that offer free automatic updates, so users will never have a chance to say later. <img src='http://www.gfi.com/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:35:02 by W3 Total Cache --