1
0
mirror of synced 2025-12-23 11:54:18 -05:00

Fix broken links in today's broken link report (#25264)

This commit is contained in:
Felicity Chapman
2022-02-11 19:45:46 +00:00
committed by GitHub
parent d9d96f9ec7
commit 3487778f9c
5 changed files with 6 additions and 7 deletions

View File

@@ -60,4 +60,4 @@ For an example of an incident response workflow, see the "Data Breach Response P
You should conduct regular vulnerability scans of production infrastructure. You should triage the results of vulnerability scans and define a period of time in which you agree to remediate the vulnerability.
If you are not ready to set up a full vulnerability management program, it's useful to start by creating a patching process. For guidance in creating a patch management policy, see this TechRepublic article "[Establish a patch management policy](https://www.techrepublic.com/blog/it-security/establish-a-patch-management-policy-87756/)."
If you are not ready to set up a full vulnerability management program, it's useful to start by creating a patching process. For guidance in creating a patch management policy, see this TechRepublic article "[Establish a patch management policy](https://www.techrepublic.com/article/establish-a-patch-management-policy-87756/)."