Assessing Current Vulnerability Management Processes | part of Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program | Wiley-IEEE Press books | IEEE Xplore