Mechanisms exist to detect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications.
Does the organization detect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications?