How often is your software scanned for vulnerabilities and what is the procedure for remediation?

How often is your software scanned for vulnerabilities and what is the procedure for remediation?