Vulnerability scanners or penetration tests can be used to identify security gaps:
-
Vulnerability scanners define, identify and classify security gaps in the IT infrastructure. They usually use databases to identify known vulnerabilities.
-
Penetration tests involve simulated cyber attacks on systems, networks, technology, etc. to identify, test and demonstrate security vulnerabilities. These penetration tests are often conducted by ethical hackers and commissioned by the organisation itself.