Your organization is reviewing its vulnerability management process and requires a method to routinely identify new and unaddressed vulnerabilities on its network devices, servers, and workstations. Which of the following is the BEST method to accomplish this?
Subscribing to threat feeds that include intelligence on the latest security risks
Performing annual penetration testing
Conducting regular vulnerability scanning
Implementing an enterprise-level firewall with advanced threat detection capabilities