The Pros and Cons of Vulnerability Scanning