>Two New SCAP Documents Help Improve Automating Computer Security Management
>It's increasingly difficult to keep up with all the vulnerabilities present in today's highly complex operating systems and applications. Attackers constantly search for and exploit these vulnerabilities to commit identity…