Skip to main content
June 2, 2015

How Organized Was Your Heartbleed Response?

Heartbleed, Shellshock, FREAK, POODLE, VENOM – these are just some of the branded vulnerabilities that were disclosed in the past 18 months. With so many branded vulnerabilities coming out executives are paying more attention to application security. This is great, except that it also means CISOs and security professionals are under increased pressure to react to vulnerability disclosures, rather than create comprehensive, strategic plans around securing the applications that run their businesses.  CISOs want their security programs to be more strategic in nature, yet they cannot ignore these potentially threatening vulnerabilities. They need a plan that can help them determine how urgent a vulnerability is, and how the team can respond.

This infographic outlines the five steps every vulnerability response plan should have. 

Jessica is part of the content team at Veracode. In this role she strives to create and promote content that will engage, educate and inspire security professionals around the topic of application security. Jessica’s involvement with the security industry goes back more than a decade at companies like Astaro, and Sophos where she held roles in corporate communication and marketing.

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.