Discussion about this post

User's avatar
Mitch Read's avatar

Amazing stuff James. I'm at Sysdig and we offer "In Use Vulnerabilities" (see here: https://sysdig.com/solutions/vulnerability-management/)

Is this another valid prioritisation method? That the vuln is loaded in memory? We do the Exploit and Fixable too right now, but I'd love your POV on the in use piece. Thanks.

Expand full comment
Bill B's avatar

Great article into operationalizing vulnerability mgmt. One nit: You didn’t mention “mitigations”, just patching availability; the situation is not binary. It’s possible that a vendor patch isn’t available but a workaround / compensating control is possible — that needs to be factored into the calculation too. Especially for a critical vuln, easily exploitable and externally accessible.

Expand full comment
1 more comment...

No posts