{"id":874,"date":"2024-06-17T08:00:00","date_gmt":"2024-06-17T15:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=874"},"modified":"2025-04-14T09:32:58","modified_gmt":"2025-04-14T16:32:58","slug":"stop-remediating-backward-reactive-approaches-arent-a-long-term-solution","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/","title":{"rendered":"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution"},"content":{"rendered":"\n<p>Prioritization in vulnerability management is not just about fixing problems but fixing the right problems at the right time.<\/p>\n\n\n\n<p>Not all vulnerabilities have the same level of risk. But gathering details to understand vulnerability impact takes time, a huge challenge for already overworked staff. Many are forced to work backward, taking critical issues obtained from 3rd party sources like CISA <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV<\/a> or a Reddit forum and then search for assets that it may apply to.<\/p>\n\n\n\n<p>This post will explore core elements of a sound vulnerability management program and how CyCognito <a href=\"https:\/\/www.cycognito.com\/use-cases\/prioritize-and-eliminate-attack-vectors.php\">Attack Surface Management (ASM)<\/a> empowers response teams to act swiftly and decisively.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Approaches That Aren\u2019t Working<\/h2>\n\n\n\n<p>\u201cWork faster and close more tickets.\u201d is a mantra when leadership treats proactive security as an line-item expense. Closing more tickets doesn\u2019t always lead to risk reduction.&nbsp;<\/p>\n\n\n\n<p>On the opposite end of the spectrum, some organizations choose to ignore issues completely, relying instead on system hardening and periodic patching cycles (monthly or quarterly) to manage updates. This \u201chope for the best\u201d approach leaves large gaps of risk open for long periods of time.<\/p>\n\n\n\n<p>For both, when a critical vulnerability (like those in CISA\u2019s KEV) makes the news, the teams work backward, searching for assets in their inventory that match the target criteria. These are remediated immediately, often within the day, which is a testament to the team\u2019s capabilities. Unfortunately, it is also reactive, opportunistic, disruptive, and exhausting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CVSS Improvements &#8211; Helpful but Difficult&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.first.org\/cvss\/\">First.org<\/a>, the organization that manages CVSS, is listening. CVSS version 4 was released in late 2023 and includes environmental metrics for business impact and five severity levels instead of three. This delivers higher fidelity scores and help SecOps teams prioritize more accurately.<\/p>\n\n\n\n<p>On paper, it&#8217;s progress. In practice, it requires security teams to do more math (and gather more data) in a workflow that they already don\u2019t have enough time to do.<\/p>\n\n\n\n<p>A simpler approach is required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Core Elements of a Sound Prioritization Strategy<\/h2>\n\n\n\n<p>Stepping back for a moment, let&#8217;s look at what a prioritization strategy should incorporate:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Validated vulnerabilities \u2013<\/strong> False positives waste time and increase frustration. You need to be confident that a presented issue exists on an asset your organization owns.<\/li>\n\n\n\n<li><strong>Business context &#8211; <\/strong>An asset\u2019s business purpose and owner will directly affect remediation priority and effort.<\/li>\n\n\n\n<li><strong>Meaningful scores and grades \u2013 <\/strong>Severity scores must represent both an attacker\u2019s thought process and impact on your business.<\/li>\n\n\n\n<li><strong>Timely results \u2013<\/strong> Data should be updated frequently to keep the mean time to remediation (MTTR) low.<\/li>\n<\/ul>\n\n\n\n<p>Easier said than done. Which is why the last item on the list is perhaps the most important:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automation<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Given the size of the external attack surface and rate of change (up to 10% each month, according to <a href=\"https:\/\/www.cycognito.com\/platform\/discovery.php#:~:text=Change%20is%20constant.,an%20automated%20discovery%20process%20becomes.\">our research<\/a>), prioritization (and vulnerability management overall) won\u2019t be successful without tools that perform the required research and validation for you.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Using CyCognito to Discover and Prioritize Your Issues<\/h2>\n\n\n\n<p class=\"has-text-align-left\">The CyCognito platform automatically combines asset criticality, security test results and threat intelligence to assess which assets pose the greatest risk to your organization. Figure 1 shows a list of issues ranked in order of importance. This view can be filtered or reordered based on any context or tag.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1237\" height=\"284\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp\" alt=\"\" class=\"wp-image-883\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp 1237w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8-512x118.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8-768x176.webp 768w\" sizes=\"auto, (max-width: 1237px) 100vw, 1237px\" \/><\/figure><\/div>\n\n\n<p class=\"caption\">Figure 1: List of Top Issues<\/p>\n\n\n\n<p>Organizations chartered with a \u201cclose more tickets\u201d approach to risk remediation can shift to CyCognito and immediately know:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>All exposed assets have been identified, validated and actively tested<\/li>\n\n\n\n<li>The issues represent true risk to their organization<\/li>\n\n\n\n<li>They have the evidence to support risk scoring<\/li>\n\n\n\n<li>The team that owns the asset<\/li>\n\n\n\n<li>The steps needed to remediate<\/li>\n\n\n\n<li>If remediation was successful<\/li>\n<\/ul>\n\n\n\n<p>CyCognito significantly outperforms vulnerability management solutions in prioritizing critical issues, with only 0.1%-0.01% classified as critical compared to ~3%.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Walkthrough of CyCognito\u2019s Issue Prioritization Pipeline<\/h2>\n\n\n\n<p>Let&#8217;s take a look at the steps CyCognito uses to build the issue list.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Step 1: External Asset Inventory<\/strong><\/h4>\n\n\n\n<p>A good vulnerability management service is a good asset management service. This critical component is difficult (and time-consuming) to accomplish, which is why CyCognito automatically builds an inventory of exposed assets, without seed data or configuration (read more in <a href=\"https:\/\/www.cycognito.com\/blog\/discovery-dont-let-the-wrong-definition-impact-your-risk-exposure\/\">this blog<\/a>).&nbsp;<\/p>\n\n\n\n<p>CyCognito inventory data is fed into the testing and prioritization engine. The results are accessed through CyCognito\u2019s \u201cAttack Surface Dashboard,\u201d your external attack surface view for all divisions of your company. Figure 2 shows 49 environments (for example, web server, web application firewall, database, etc.), the number of assets, and the number of assets at risk. Different cuts of the data are available based on what you need.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1241\" height=\"737\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image13.webp\" alt=\"\" class=\"wp-image-885\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image13.webp 1241w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image13-512x304.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image13-768x456.webp 768w\" sizes=\"auto, (max-width: 1241px) 100vw, 1241px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 2: Attack Surface Summary<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Step 2: Business Context<\/strong><\/h4>\n\n\n\n<p>Business context, including ownership (attribution), is added to each asset. Evidence \u2013 as shown in Figure 3, a linked Wikipedia page \u2013 and certainty scores are attached to every decision. This makes it simple to validate decisions for cross-functional communication.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1017\" height=\"313\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image1.webp\" alt=\"\" class=\"wp-image-886\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image1.webp 1017w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image1-512x158.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image1-768x236.webp 768w\" sizes=\"auto, (max-width: 1017px) 100vw, 1017px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 3: Discovery Path of Asset<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Step 3: Security Test Results<\/h4>\n\n\n\n<p>Active security test results, including <a href=\"\/learn\/application-security\/dynamic-application-security.php\">dynamic application security testing (DAST)<\/a> for web applications, are added to each asset. Tests are multi-pass and multi-engine to ensure high precision and accuracy. Figure 3 presents a domain takeover risk example. More details are available by clicking into the issue.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"108\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image5-1280x108.webp\" alt=\"\" class=\"wp-image-887\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image5-1280x108.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image5-512x43.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image5-768x65.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image5.webp 1405w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 4: Critical Domain Takeover Issue<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Step 4: Threat Intelligence<\/h4>\n\n\n\n<p>Third-party sources like CISA&#8217;s Known Exploited Vulnerabilities (KEV) and dark web intelligence are layered on the asset for real-time insight into exploitation. Figure 5 shows a summary of impact analysis, including threat intelligence which indicates this issue is both highly available and of high interest.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"872\" height=\"546\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image7.webp\" alt=\"\" class=\"wp-image-888\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image7.webp 872w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image7-512x321.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image7-768x481.webp 768w\" sizes=\"auto, (max-width: 872px) 100vw, 872px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 5: Impact Analysis Summary<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Step 5: Risk Context<\/h4>\n\n\n\n<p>Discoverability (ease of being found by attackers) and attractiveness (potential value to attackers) context are added to provide a view into an attacker\u2019s mindset. Figure 6 shows the security overview of an asset in the inventory. With both discovery and attractiveness at extreme level, the issues should be resolved immediately.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1105\" height=\"671\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image2.webp\" alt=\"\" class=\"wp-image-889\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image2.webp 1105w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image2-512x311.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image2-768x466.webp 768w\" sizes=\"auto, (max-width: 1105px) 100vw, 1105px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 6: Security Overview<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More about CyCognito\u2019s Attractiveness and Discoverability Context<\/h2>\n\n\n\n<p>CyCognito understands that not all assets are equal in the eyes of attackers. For example, consider the two assets in Figure 7 with an identical number of severe issues. While they might initially appear to have the same risk level, their attractiveness to an attacker can significantly differentiate their risk. An asset using remote desktop protocol (RDP) might be more appealing to attackers due to its location in the network and ability to gain rapid access. Another asset with similar issues but less strategic importance might pose a lower risk.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"826\" height=\"148\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image12.webp\" alt=\"\" class=\"wp-image-890\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image12.webp 826w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image12-512x92.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image12-768x138.webp 768w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"828\" height=\"146\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image10.webp\" alt=\"\" class=\"wp-image-891\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image10.webp 828w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image10-512x90.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image10-768x135.webp 768w\" sizes=\"auto, (max-width: 828px) 100vw, 828px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 7: Comparison of Two Assets with Different Scores<\/p>\n\n\n\n<p>CyCognito automatically sets the priorities so that you can move immediately into remediation. Have a question about the data? All supporting evidence is available for your review at any time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CyCognito Remediation Planner Makes it Easy to Align Goals with Actions<\/h2>\n\n\n\n<p>Want to move your e-commerce division in Germany from a grade of D to a C? Use CyCognito\u2019s remediation planner tool to create explicit directions on how to get there and measure progress during the journey.<\/p>\n\n\n\n<p>CyCognito\u2019s remediation tracker and remediation planning dashboards, a partial view shown in Figure 8, allows you to visualize remediation progress across division, geography, team, asset type and more. In this example the organization would need to address 425 issues to meet their goals. Click a link to get the full list with remediation steps.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"530\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image4-1280x530.webp\" alt=\"\" class=\"wp-image-892\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image4-1280x530.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image4-512x212.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image4-768x318.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image4.webp 1308w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1054\" height=\"555\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image6.webp\" alt=\"\" class=\"wp-image-893\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image6.webp 1054w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image6-512x270.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image6-768x404.webp 768w\" sizes=\"auto, (max-width: 1054px) 100vw, 1054px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 8: A Snapshot of CyCognito Remediation Planner<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Let CyCognito Deliver Your Prioritization Workflow<\/h2>\n\n\n\n<p>Traditional prioritization requires manual effort and many assumptions, making it prone to inaccuracies. An automated prioritization workflow is required to maintain pace and enable your team to work efficiently.&nbsp;&nbsp;<\/p>\n\n\n\n<p>CyCognito\u2019s fully automated issue prioritization and remediation workflows allow your team to convert an operationally complex process into a simple service model. Contact us at info@cycognito.com to discover how we can help automate prioritization across your entire attack surface.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SecOps is often challenged to prioritize issues efficiently. CyCognito delivers the accuracy, coverage, and frequency for confident remediation.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[164,163,22,165],"class_list":["post-874","post","type-post","status-publish","format-standard","hentry","category-product","tag-grading","tag-prioritization","tag-remediation","tag-scoring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"SecOps is often challenged to prioritize issues efficiently. CyCognito delivers the accuracy, coverage, and frequency for confident remediation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution\" \/>\n<meta property=\"og:description\" content=\"SecOps is often challenged to prioritize issues efficiently. CyCognito delivers the accuracy, coverage, and frequency for confident remediation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-17T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-14T16:32:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-06-17-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jason Pappalexis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Pappalexis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/\"},\"author\":{\"name\":\"Jason Pappalexis\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b\"},\"headline\":\"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution\",\"datePublished\":\"2024-06-17T15:00:00+00:00\",\"dateModified\":\"2025-04-14T16:32:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/\"},\"wordCount\":1300,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp\",\"keywords\":[\"Grading\",\"Prioritization\",\"Remediation\",\"Scoring\"],\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/\",\"name\":\"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp\",\"datePublished\":\"2024-06-17T15:00:00+00:00\",\"dateModified\":\"2025-04-14T16:32:58+00:00\",\"description\":\"SecOps is often challenged to prioritize issues efficiently. CyCognito delivers the accuracy, coverage, and frequency for confident remediation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp\",\"width\":1237,\"height\":284},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b\",\"name\":\"Jason Pappalexis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g\",\"caption\":\"Jason Pappalexis\"},\"description\":\"Sr. Technical Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jason-pappalexis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution | CyCognito Blog","description":"SecOps is often challenged to prioritize issues efficiently. CyCognito delivers the accuracy, coverage, and frequency for confident remediation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/","og_locale":"en_US","og_type":"article","og_title":"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution","og_description":"SecOps is often challenged to prioritize issues efficiently. CyCognito delivers the accuracy, coverage, and frequency for confident remediation.","og_url":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/","og_site_name":"CyCognito Blog","article_published_time":"2024-06-17T15:00:00+00:00","article_modified_time":"2025-04-14T16:32:58+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-06-17-2400x1256-email.png","type":"image\/png"}],"author":"Jason Pappalexis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason Pappalexis","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/"},"author":{"name":"Jason Pappalexis","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b"},"headline":"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution","datePublished":"2024-06-17T15:00:00+00:00","dateModified":"2025-04-14T16:32:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/"},"wordCount":1300,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp","keywords":["Grading","Prioritization","Remediation","Scoring"],"articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/","url":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/","name":"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp","datePublished":"2024-06-17T15:00:00+00:00","dateModified":"2025-04-14T16:32:58+00:00","description":"SecOps is often challenged to prioritize issues efficiently. CyCognito delivers the accuracy, coverage, and frequency for confident remediation.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image8.webp","width":1237,"height":284},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/stop-remediating-backward-reactive-approaches-arent-a-long-term-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Stop Remediating Backward \u2013 Reactive Approaches Aren\u2019t a Long-Term Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d24c88adb69cc9e8748425394054a55b","name":"Jason Pappalexis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3e2da561c68bc740a2a280b72b231ff?s=96&d=mm&r=g","caption":"Jason Pappalexis"},"description":"Sr. Technical Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/jason-pappalexis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=874"}],"version-history":[{"count":9,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/874\/revisions"}],"predecessor-version":[{"id":1457,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/874\/revisions\/1457"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}