This pieces focuses on how IT security folks can use the same method to identify vulnerabilities in our own IT environments so we can fix them and stay ahead of the bad guys. Note that you’ll need to register and log in to read the paper:
http://twimgs.com/darkreading/vulnerabilitymgmt/S4440312_Google_vulnmgmt.pdf