<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>CyberMaxx</provider_name><provider_url>https://www.cybermaxx.com</provider_url><title>Using Security Control Management to Monitor Vulnerabilities and Risks | CyberMaxx</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="nRF7Rmew8g"&gt;&lt;a href="https://www.cybermaxx.com/resources/using-security-control-management-to-monitor-vulnerabilities-and-risks/"&gt;Using Security Control Management to Monitor Vulnerabilities and Risks&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cybermaxx.com/resources/using-security-control-management-to-monitor-vulnerabilities-and-risks/embed/#?secret=nRF7Rmew8g" width="600" height="338" title="&#x201C;Using Security Control Management to Monitor Vulnerabilities and Risks&#x201D; &#x2014; CyberMaxx" data-secret="nRF7Rmew8g" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.cybermaxx.com/wp-content/uploads/2024/02/Using-Security-Control-Management-to-Monitor-Vulnerabilities-and-Risks.png</thumbnail_url><thumbnail_width>1920</thumbnail_width><thumbnail_height>1080</thumbnail_height><description>Vulnerability and risk management (VRM) identifies, prioritizes, and addresses organizational risks and vulnerabilities. This article explores how security control management (SCM) can help monitor this more effectively. What is Vulnerability and Risk Management (VRM) in Security Control Management (SCM)? Security control management (SCM) allows an organization to enforce security policies across its IT ecosystem. Vulnerability [&hellip;]</description></oembed>
