{"id":131,"date":"2023-08-24T21:45:50","date_gmt":"2023-08-24T21:45:50","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=131"},"modified":"2025-03-11T09:04:04","modified_gmt":"2025-03-11T16:04:04","slug":"vulnerability-prioritization-what-to-consider","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/","title":{"rendered":"Vulnerability Prioritization: What to&nbsp;Consider"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is Vulnerability Prioritization?<\/h2>\n\n\n\n<p>In a perfect world, security teams could use a straightforward process to remediate vulnerabilities, such as \u201cfirst in, first out\u201d or FIFO. Grocery stores use this method for milk; the oldest milk in inventory gets sold first. But really, milk isn\u2019t the analogy we need to understand \u201cwhat is vulnerability prioritization.\u201d Instead, let\u2019s consider a hospital emergency room.<\/p>\n\n\n\n<p>In an emergency room, patients are triaged based on the severity of their injury or illness. The most critical patients are seen first, even if they arrived at the hospital later than other patients. This is because the most critical patients are at greater risk of dying if they don\u2019t receive treatment right away.<\/p>\n\n\n\n<p>Just like a hospital emergency room, security teams have limited resources. They can\u2019t fix all the vulnerabilities that they know about. They have to prioritize their efforts and focus on what\u2019s most important.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Vulnerability Management Prioritization in Cybersecurity?<\/h2>\n\n\n\n<p>Vulnerability management prioritization in cybersecurity refers to ranking vulnerabilities or exposures on software, hardware or systems. Prioritization is a means to resolve the most important vulnerabilities first and deal with a constantly growing number of vulnerabilities.<\/p>\n\n\n\n<p>The frequency and sheer number of vulnerabilities being disclosed has shot up in recent years. Let\u2019s consider a 20 year period from 2002 to 2022. In 2002, there were 1,000 CVEs (common vulnerabilities and exposures) disclosed monthly; in 2022 that skyrocketed to an average of 23,000 CVEs per month.<sup>1<\/sup>&nbsp;According to CyCognito\u2019s research, the average enterprise contends with 345 new \u2018critical\u2019 threats every month.<sup>2<\/sup>&nbsp;Even the worst of the vulnerabilities are still too many to confront.&nbsp;<\/p>\n\n\n\n<p>The vulnerability management process in cybersecurity is complex and involves part art and part science. There\u2019s also a lot to consider, including impacts to the business, customers, compliance regulations and the health of critical systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Scanning Vendor Prioritization<\/h2>\n\n\n\n<p>Given the complexity of vulnerability prioritization, there really are no standards for determining how you should prioritize. Industry analysts like Gartner or training groups like the SANS Institute do provide some guidance. Most agree that taking a risk-based approach to prioritization is best, but even that has nuances such as the size of your risk appetite and how you define risk.<\/p>\n\n\n\n<p>Vulnerability scanning vendors can provide detailed information about identified vulnerabilities, including their severity and exploitability. However, they tend to only review assets you tell them to scan, often by providing an IP address or other location information. Additionally, they also are typically limited to very few contextual details about the affected asset. Contextual details include things like what software or services are running, what other assets it technically links to, if it is connected to data and if the data is sensitive.<\/p>\n\n\n\n<p>While vulnerability scanning vendors can provide value, it\u2019s important to understand how they find assets and how they align to your organization\u2019s goals for prioritizing vulnerabilities.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Vulnerability Prioritization is Important<\/h2>\n\n\n\n<p>Prioritizing and remediating crucial security vulnerabilities is important because it helps reduce the attack surface exposures attackers can use to exploit sensitive data, cause service disruptions, violate compliance requirements or cause reputational harm.<\/p>\n\n\n\n<p>Vulnerability prioritization also helps to ensure resources are focused on the right issues and the most critical and high vulnerabilities are being addressed. Some compliance frameworks require a vulnerability management program and vulnerability prioritization in cybersecurity is an essential part of this process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does a Vulnerability Prioritization Matrix Work?<\/h2>\n\n\n\n<p>A typical vulnerability prioritization matrix is a tool used by security teams to consider the cross-section of vulnerability factors to prioritize according to their risk tolerance. A basic prioritization matrix can be made by considering the intersection of both severity and probability.<\/p>\n\n\n\n<p>Assigning severity or probability can be based on a single factor or a formula that assigns weights to several factors. It\u2019s important that the formula you use aligns to your organization\u2019s business and systems.<\/p>\n\n\n\n<p><strong>Severity<\/strong>&nbsp;considers the technical severity, such as CVSS (common vulnerability scoring system) score, which assigns a 0-10 numerical value to compare the severities. CVSS also looks at if the vulnerability would enable the attacker to propagate across systems.<\/p>\n\n\n\n<p><strong>Probability<\/strong>&nbsp;considers how easily the vulnerability can be exploited by attackers. When considering ease, how complex the vulnerability is or if it requires privileges to exploit can be primary factors.<\/p>\n\n\n\n<p>A vulnerability matrix based on severity and probability might look like Figure 1 below. Severity is the X axis and the columns align to CVSS ratings from Low to Critical. Probability is the Y axis and the rows are Top to Bottom.<\/p>\n\n\n\n<p>This example of a vulnerability matrix shows that while there are 345 vulnerabilities with a critical severity score, only 120 are top priority. Focusing on these top priority critical severity vulnerabilities helps focus immediate attention on the top 35% of critical vulnerabilities. Regardless of the priority, the vulnerability matrix helps to make more informed decisions.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"347\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png\" alt=\"\" class=\"wp-image-135\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-512x139.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-768x208.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1536x417.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability.png 1710w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<p><em>Figure 1: A vulnerability prioritization matrix with two factors, severity and priority.<\/em><\/p>\n\n\n\n<p><strong>Impact&nbsp;<\/strong>is commonly a formula that considers the potential damage to a particular system or how many systems could be affected.<\/p>\n\n\n\n<p>A vulnerability matrix can be expanded to consider a third factor. In Figure 2, we show an example of adding the factor \u201cImpact\u201d with values of \u201cHigh\u201d, \u201cMedium\u201d and \u201cLow\u201d. The formula for Impact accounts for the potential damage a vulnerability could cause to the organization.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"343\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-with-three-factors-severity-priority-and-impact-1280x343.png\" alt=\"\" class=\"wp-image-136\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-with-three-factors-severity-priority-and-impact-1280x343.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-with-three-factors-severity-priority-and-impact-512x137.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-with-three-factors-severity-priority-and-impact-768x206.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-with-three-factors-severity-priority-and-impact-1536x412.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-with-three-factors-severity-priority-and-impact.png 1724w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<p>Figure 2: A vulnerability matrix with three factors: severity, priority and impact.<\/p>\n\n\n\n<p>Let\u2019s take a look at how to calculate some other factors and what they mean.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Calculate Vulnerability Score: Unraveling Digital Weakness<\/h5>\n\n\n\n<p>A vulnerability score is a combination of factors, typically calculated based on a formula of weighted attributes. Typical factors in calculating the score include the severity of the vulnerability, its potential impact, and how easy it is to exploit.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Calculate Asset Risk Score: Decoding Digital Peril<\/h5>\n\n\n\n<p>The score is a numerical value that assesses what the asset exposes, including sensitive data the asset contains or critical systems it can provide access to. An asset risk score can be used to identify assets that need greater protection or deeper security assessment like dedicated penetration testing.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Risk Attribute Weights: Balancing Cyber Defenses<\/h5>\n\n\n\n<p>Risk attribute weights help to assign relative importance to various factors. When considering the vulnerability score and the asset risk score, the overall score should be weighted using a formula to properly balance the importance of the asset at risk, be that it contains sensitive data or is a critical system. Highly important and sensitive asset risks may warrant higher prioritization even if the vulnerability is considered low or unlikely.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Automate Vulnerability Prioritization: Unleashing Efficiency<\/h5>\n\n\n\n<p>Manual vulnerability prioritization is time consuming and error prone. And once prioritization is done, you\u2019re then off to manage the remediation process, which we discuss in more detail in\u00a0<a href=\"\/blog\/how-to-supercharge-your-vulnerability-remediation-process\/\">this blog on vulnerability remediation.<\/a><\/p>\n\n\n\n<p>The tables mentioned earlier quickly become complex with just a third factor added. As we\u2019ll discuss shortly, keeping prioritization up-to-date is important yet hard to do with today\u2019s constantly changing IT infrastructure.<\/p>\n\n\n\n<p>CyCognito provides an attacker\u2019s perspective of your attack surface to help uncover unknown, unmanaged assets and uses active security testing to discover vulnerabilities. With CyCognito\u2019s automation, information about the vulnerability, the asset, and attacker insight and other factors contribute to vulnerability priorities. They are also kept up-to-date and assessed on a routine, even weekly cadence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Examples of Adapting to Vulnerability Prioritization Techniques<\/h2>\n\n\n\n<p>Previously we discussed using a vulnerability prioritization matrix to assess the intersection of a few factors. Now let\u2019s consider a few other prioritization techniques.<\/p>\n\n\n\n<p><strong>Vulnerability disclosure date.<\/strong>&nbsp;Each vulnerability with a CVE number has a disclosure date. Some vulnerabilities that exist in your environment may have been disclosed several years ago and thus, a cut-off based on disclosure date could establish which vulnerabilities to prioritize.&nbsp;<\/p>\n\n\n\n<p><strong>Compliance requirements.&nbsp;<\/strong>Governing bodies establish requirements and they typically apply to specific industries. Health Insurance Portability and Accountability Act (HIPAA) is a federal law designed to protect the privacy and security of patient health information and Payment Card Industry Data Security Standard (PCI DSS) is a set of standards for payment cardholder data security. These are just examples and there are others. Most compliance requirements mandate scanning for and remediating vulnerabilities and some may require specific security controls to be in place.<\/p>\n\n\n\n<p><strong>Application type or system architecture.&nbsp;<\/strong>Certain infrastructure inherently has a high likelihood of attack. Web applications, for example, are generally accessible to anyone with an internet connection and can be the front door for attackers to reach sensitive data. When prioritizing vulnerabilities of a particular type of asset, consider if there are common configuration issues that could be addressed by a team training for asset owners. Figure 3 shows how web apps are viewed in the Cycognito platform.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1224\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-19.png\" alt=\"Some types of assets, like web applications, benefit from having their vulnerabilities evaluated and prioritized separately. CyCognito\u2019s Web Application Risk dashboard examines and prioritizes just vulnerabilities affecting web applications.\" class=\"wp-image-134\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-19.png 1600w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-19-512x392.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-19-1280x979.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-19-768x588.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-19-1536x1175.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure><\/div>\n\n\n<p><em>Figure 3. Some types of assets, like web applications, benefit from having their vulnerabilities evaluated and prioritized separately. CyCognito\u2019s Web Application Risk dashboard examines and prioritizes just vulnerabilities affecting web applications.<\/em><\/p>\n\n\n\n<p><strong>Ease of remediation.&nbsp;<\/strong>Prioritizing vulnerabilities based on how easy they are to remediate might be the best way to reduce the overall vulnerabilities fastest and possibly with less resources. This could mean focusing on vulnerabilities that are better-documented or don\u2019t require special expertise to remediate. Some vulnerabilities require a hardware upgrade whereas ones that just need a patch could be faster, cheaper and more immediately beneficial to remediate.<\/p>\n\n\n\n<p>These are just examples of techniques that can help your prioritization strategy. Keep in mind that combining factors and techniques makes the biggest impact. A word of caution: while it\u2019s easy to focus on reducing the overall number of vulnerabilities, make sure you\u2019re prioritizing risks to the business. The primary goal is to safeguard your organization\u2019s core intellectual and electronic assets. Better understanding the parts of the business assets support and what information they connect to can play a critical role in vulnerability prioritization. Once your vulnerabilities are prioritized, read our\u00a0<a href=\"\/blog\/how-to-supercharge-your-vulnerability-remediation-process\/\">blog on vulnerability remediation<\/a>\u00a0to understand the next steps to take action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Prioritization Challenges<\/h2>\n\n\n\n<p>Some of the biggest challenges in vulnerability prioritization are driven by having incomplete asset inventories, having incomplete data about assets or not prioritizing based on the right factors. The data below shows the impact of these challenges.<\/p>\n\n\n\n<p><strong>For the worse.&nbsp;<\/strong>Helpful stats on past breaches reveal that 60% of breaches occurred because of vulnerabilities that went unpatched,<sup>3<\/sup>&nbsp;even though a patch was available. It\u2019s been commonly reported that attackers are exploiting CVEs that were disclosed as many as 7 years prior. These statistics demonstrate that assuming old vulnerabilities don\u2019t matter is bad practice and that prioritizing what really matters is a tough challenge.<\/p>\n\n\n\n<p><strong>For the better.\u00a0<\/strong>There is hope:\u00a0<a href=\"\/resources\/reports\/cycognito-state-of-external-exposure-management\/\">a recent report by CyCognito<\/a>\u00a0explained that additional context beyond simply the CVSS score helped lower the priority on 35% of issues. A small 2% were given increased priority. With the right context, your prioritization efforts can go beyond the severity of the vulnerability and look at the actual exposed risk. The result can be fewer high priority issues, saving time and resources while keeping the organization safe. Figures 4 and 5 show some of the ways the CyCognito platform helps to view vulnerabilities.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"775\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-17.png\" alt=\"The CyCognito platform\u2019s Issue Dashboard shows several ways to evaluate issues, including severity, status, and exploitation complexity.\" class=\"wp-image-132\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-17.png 1600w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-17-512x248.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-17-1280x620.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-17-768x372.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-17-1536x744.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure><\/div>\n\n\n<p><em>Figure 4. The CyCognito platform\u2019s Issue Dashboard shows several ways to evaluate issues, including severity, status, and exploitation complexity.<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"484\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-18.png\" alt=\"The affected environment or location may also inform vulnerability prioritization.\" class=\"wp-image-133\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-18.png 1600w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-18-512x155.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-18-1280x387.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-18-768x232.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-18-1536x465.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure><\/div>\n\n\n<p><em>Figure 5. The affected environment or location may also inform vulnerability prioritization.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Factors for Effective Vulnerability Prioritization<\/h2>\n\n\n\n<p>Let\u2019s consider five important key factors to consider when building your formula for vulnerability prioritization should include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Potential impact of an exploited asset,<\/strong>&nbsp;considering both the technical and business impact.<\/li>\n\n\n\n<li><strong>Business context<\/strong>&nbsp;about the asset will help you understand how interesting it is to attackers.<\/li>\n\n\n\n<li><strong>Exploitation complexity<\/strong>&nbsp;helps to know which vulnerabilities are easiest to exploit and are likely to be within an attacker\u2019s path of least resistance.<\/li>\n\n\n\n<li><strong>Discoverability<\/strong>&nbsp;to know how easy it is for an attacker to find the asset and associate it with the organization.<\/li>\n\n\n\n<li><strong>Remediation effort<\/strong>&nbsp;to know the effort and skill level required to fix the vulnerability.<\/li>\n<\/ol>\n\n\n\n<p>Weighing these criteria as part of your scoring system formula can help effectively prioritize vulnerabilities for accelerated remediation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Prioritize Vulnerabilities Properly<\/h2>\n\n\n\n<p>Attackers are looking at your organization trying to find weak spots or vulnerabilities that allow them a way in. Most often, attackers are looking for the easiest way in and that path might not be the front door. It might be through a separate business unit, a branch location or recent acquisition.<\/p>\n\n\n\n<p>This is why the CyCognito platform maps your external attack surface and helps you identify your externally exposed risks.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Identify Critical Assets<\/h5>\n\n\n\n<p>Maintaining an accurate inventory of assets is difficult; a recent report by CyCognito findings discovered Fortune 500 organizations are\u00a0<a href=\"\/resources\/reports\/cycognito-state-of-external-exposure-management\/\">unaware of 10% to 30% of their own business units, brands or branches.<\/a><\/p>\n\n\n\n<p>CyCognito\u2019s discovery begins by mapping the entire organization. The next step is to discover all assets associated with each entity, identifying all assets across your entire external attack surface.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Identify Vulnerabilities<\/h5>\n\n\n\n<p>Identifying vulnerabilities can be done a number of ways, but not all are equal. It\u2019s important to assess all your assets on a regular basis. The CyCognito platform helps you more thoroughly assess vulnerabilities by performing\u00a0<a href=\"\/platform\/active-security-testing.php\">active security testing<\/a>\u00a0across all live assets.<\/p>\n\n\n\n<p>An important consideration is how frequently you are assessing your attack surface because the size of environments fluctuates larger and smaller,\u00a0<a href=\"\/resources\/reports\/cycognito-state-of-external-exposure-management\/\">as much as 10% per month.<\/a>\u00a0Bear in mind that cloud environments can change rapidly, often daily.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Categorize and Prioritize Vulnerabilities<\/h5>\n\n\n\n<p>To assess asset risk, it\u2019s important to have contextual information about the asset including the applications, operating system or services that are running on it and what data it might provide access to. This context will help you assess the exposed risk created by the vulnerability.<\/p>\n\n\n\n<p>CyCognito helps you to\u00a0<a href=\"\/platform\/prioritization.php\">prioritize vulnerabilities<\/a>\u00a0according to risk exposure they create. CyCognito\u2019s\u00a0<a href=\"\/platform\/exploit-intelligence.php\">Exploit Intelligence<\/a>\u00a0enhances risk prioritization by incorporating threat intelligence to understand attacker activity on the exploit in the wild.\u00a0<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Implement Fixes &amp; Mitigations<\/h5>\n\n\n\n<p>Mitigating risk exposure and fixing vulnerabilities takes communication and coordination. As you read our\u00a0<a href=\"\/blog\/how-to-supercharge-your-vulnerability-remediation-process\/\">blog on vulnerability remediation,<\/a>\u00a0pay close attention to techniques to implement a program using best practices and metrics to help monitor the effectiveness of your program.<\/p>\n\n\n\n<p><a href=\"\/platform\/remediation-acceleration.php\">CyCognito helps automate remediation steps<\/a>\u00a0to accelerate the process by integrating with ticketing systems, SIEMs and various vulnerability management platforms. Step-by-step guidance to fix the vulnerabilities and evidence of findings are automatically made available to help teams resolve issues quickly with confidence.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Monitor and Retest for Vulnerabilities<\/h5>\n\n\n\n<p>Once the vulnerabilities are resolved, it\u2019s important to retest and revalidate the vulnerability is no longer there. By continuously assessing your external attack surface management, you can monitor for any new vulnerabilities as changes are made throughout your organization, be that in the cloud, at a remote location or anywhere IT assets are made available to the internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learn more about how CyCognito can help you prioritize vulnerabilities.<\/h2>\n\n\n\n<p>Explore the CyCognito platform with a self-guided, interactive dashboard product tour. To speak with one of our experts to discuss how the CyCognito platform can help you prioritize your vulnerabilities according to your external risk exposure, schedule a\u00a0<a href=\"\/demo\/\">vulnerability prioritization demo<\/a>\u00a0now!<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Sources:<\/h5>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.iamagazine.com\/markets\/1-900-new-cyber-vulnerabilities-each-month-in-2023-says-coalition\">https:\/\/www.iamagazine.com\/markets\/1-900-new-cyber-vulnerabilities-each-month-in-2023-says-coalition<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.spiceworks.com\/it-security\/vulnerability-management\/guest-article\/external-exposure-management-are-your-attack-surfaces-safe\/\">https:\/\/www.spiceworks.com\/it-security\/vulnerability-management\/guest-article\/external-exposure-management-are-your-attack-surfaces-safe\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.servicenow.com\/lpayr\/ponemon-vulnerability-survey.html\">https:\/\/www.servicenow.com\/lpayr\/ponemon-vulnerability-survey.html<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability prioritization is the process of identifying and ranking vulnerabilities in order to focus efforts on the most important vulnerabilities.<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[6,53,18,52,50,49,47,54,40],"class_list":["post-131","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-attack-surface-management","tag-common-vulnerability-scoring-system","tag-easm","tag-exploit-intelligence","tag-risk-mitigation","tag-vulnerability-management","tag-vulnerability-prioritization","tag-vulnerability-prioritization-matrix","tag-vulnerability-remediation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Prioritization: What to&nbsp;Consider | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Without effective prioritization, security teams are left drowning in alerts they can\u2019t take action on while real risks go unresolved. Learn more about key vulnerability prioritization techniques and how risk-based prioritization data like CyCognito\u2019s can improve your risk management processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Prioritization: What to&nbsp;Consider | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Without effective prioritization, security teams are left drowning in alerts they can\u2019t take action on while real risks go unresolved. Learn more about key vulnerability prioritization techniques and how risk-based prioritization data like CyCognito\u2019s can improve your risk management processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-24T21:45:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-11T16:04:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png\" \/>\n<meta name=\"author\" content=\"Greg Delaney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Greg Delaney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/\"},\"author\":{\"name\":\"Greg Delaney\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355\"},\"headline\":\"Vulnerability Prioritization: What to&nbsp;Consider\",\"datePublished\":\"2023-08-24T21:45:50+00:00\",\"dateModified\":\"2025-03-11T16:04:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/\"},\"wordCount\":2562,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png\",\"keywords\":[\"Attack Surface Management\",\"Common Vulnerability Scoring System\",\"EASM\",\"Exploit Intelligence\",\"Risk Mitigation\",\"Vulnerability Management\",\"Vulnerability Prioritization\",\"Vulnerability Prioritization Matrix\",\"Vulnerability Remediation\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/\",\"name\":\"Vulnerability Prioritization: What to&nbsp;Consider | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png\",\"datePublished\":\"2023-08-24T21:45:50+00:00\",\"dateModified\":\"2025-03-11T16:04:04+00:00\",\"description\":\"Without effective prioritization, security teams are left drowning in alerts they can\u2019t take action on while real risks go unresolved. Learn more about key vulnerability prioritization techniques and how risk-based prioritization data like CyCognito\u2019s can improve your risk management processes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability.png\",\"width\":1710,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Prioritization: What to&nbsp;Consider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355\",\"name\":\"Greg Delaney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g\",\"caption\":\"Greg Delaney\"},\"description\":\"Was a Senior Product Marketing Manager at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/greg-delaney\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Prioritization: What to&nbsp;Consider | CyCognito Blog","description":"Without effective prioritization, security teams are left drowning in alerts they can\u2019t take action on while real risks go unresolved. Learn more about key vulnerability prioritization techniques and how risk-based prioritization data like CyCognito\u2019s can improve your risk management processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Prioritization: What to&nbsp;Consider | CyCognito Blog","og_description":"Without effective prioritization, security teams are left drowning in alerts they can\u2019t take action on while real risks go unresolved. Learn more about key vulnerability prioritization techniques and how risk-based prioritization data like CyCognito\u2019s can improve your risk management processes.","og_url":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/","og_site_name":"CyCognito Blog","article_published_time":"2023-08-24T21:45:50+00:00","article_modified_time":"2025-03-11T16:04:04+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png","type":"","width":"","height":""}],"author":"Greg Delaney","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Greg Delaney","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/"},"author":{"name":"Greg Delaney","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355"},"headline":"Vulnerability Prioritization: What to&nbsp;Consider","datePublished":"2023-08-24T21:45:50+00:00","dateModified":"2025-03-11T16:04:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/"},"wordCount":2562,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png","keywords":["Attack Surface Management","Common Vulnerability Scoring System","EASM","Exploit Intelligence","Risk Mitigation","Vulnerability Management","Vulnerability Prioritization","Vulnerability Prioritization Matrix","Vulnerability Remediation"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/","url":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/","name":"Vulnerability Prioritization: What to&nbsp;Consider | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability-1280x347.png","datePublished":"2023-08-24T21:45:50+00:00","dateModified":"2025-03-11T16:04:04+00:00","description":"Without effective prioritization, security teams are left drowning in alerts they can\u2019t take action on while real risks go unresolved. Learn more about key vulnerability prioritization techniques and how risk-based prioritization data like CyCognito\u2019s can improve your risk management processes.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/A-vulnerability-matrix-based-on-severity-and-probability.png","width":1710,"height":464},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/vulnerability-prioritization-what-to-consider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Prioritization: What to&nbsp;Consider"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355","name":"Greg Delaney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g","caption":"Greg Delaney"},"description":"Was a Senior Product Marketing Manager at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/greg-delaney\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"predecessor-version":[{"id":465,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/131\/revisions\/465"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}