Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Cybersecurity Tools: Non-Standard Risk Ratings Make Prioritization a Challenge
Cybersecurity

Cybersecurity Tools: Non-Standard Risk Ratings Make Prioritization a Challenge

Robert WoodBy Robert WoodJanuary 19, 20224 Mins Read
Facebook Twitter LinkedIn Email
Tools & Risk Prioritization
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The cybersecurity field does not have a universally adopted standard for assessing, displaying, and discussing risk. This is especially true in the space of cybersecurity tools.

A given tool may range from using CVSS scores to high/medium/low ratings, to a completely custom scoring system. Approaches to risk ratings are all over the map. I touched on this dynamic in my recent article, “In Cybersecurity, Beware Death by a Thousand Vulnerability Reports,” and I will expand on it here.

The good news is that, despite the complexity in the tooling ecosystem, there is an opportunity for simplification.

Different Examples of Tools

Let’s start by referencing several tools that operate at different layers of a technology stack. The list below is a hypothetical IT or application environment, along with a portfolio of security tools and their risk ratings.

  • Penetration testing. Cobalt – uses high, medium, and low with visualization of both the impact and likelihood ratings that make up the overall risk score.
  • Attack surface management. Risk Recon – calculates a numeric risk score, then overlays a letter grade (A-F) on top of this.
  • Cloud posture. Palo Alto Prisma – uses high, medium, low, and pass (to represent a correctly configured configuration).
  • Custom application code. Veracode – uses very high, high, medium, low, very low, and informational, then mapped to CVSS.
  • Open source libraries. Github – uses a critical, high, medium, low scale.
  • Network and host configuration. Nessus – uses CVSS scores and then assigns vulnerabilities to prioritization buckets based on the score.

The differences between each of these linguistic labels are subtle. However, subtlety can be confusing to consumers when they try to interpret results.

A Reporting Scenario

There is a trend in the industry to move away from standalone vulnerability reports towards ticketing system integrations (e.g., Jira, Github Issues, etc.). The problems now arise when a development team begins to review these incoming tickets and sort them for remediation. The developer must then:

  • Understand the environment and relate that to the details in the ticket
  • Interpret the difference between an 8.5, a high, a very high, and a critical

Taken together, the developer owns the burden of interpretation. Further, the right answer on interpretation depends heavily on the context of the vulnerability, the application function, and the environment. This is something that many scanning tools lack in varying degrees.

The security leader who is pulling together risk metrics to brief senior leadership or a board of directors shares the burden in a similar way. The subject matter expertise, in this case, may make this easier, but it’s still an added layer of work.

Enrichment

Some tools have started to enrich the vulnerabilities in their platform to assist with prioritization. This takes many forms such as code path verification, threat intelligence against specific vulnerabilities, whether exploit code exists, and more.

This enrichment process can help users of a tool to prioritize issues while they are using the tool’s interface. Once a vulnerability has been exported out of a given tool, it may retain the enrichment metadata, but it now falls victim to the compare and contrast reporting scenario highlighted above. When a vulnerability has been enriched by a particular solution but another one has not, the consumer may still see two high-risk vulnerabilities side by side.

Penetration testing as a general practice often naturally benefits from this enrichment process. Due to the nature of it being a live test on a running system, anything found and exploited has a real factor associated with it. In contrast, when developers classify vulnerabilities as hypothetical or academic in nature, pushback follows.

An Opportunity for Security Teams

As mentioned earlier in this article, despite the complexity in the tooling ecosystem, there is an opportunity for simplification for security teams. Bring vulnerabilities together into one place where a uniform risk calculation can be created and presented to the ultimate consumer of the results. This aggregation approach could be something that is either:

  • Visible to development teams, e.g., expose the results directly to them; or
  • Invisible to them, e.g., treat this as middleware and integrate into the ticketing solutions from this point

Simplification is an underrated approach to change management, as detailed in the book Subtract: The Untapped Science of Less. Removing steps, complexity, and burden can add tremendous value to those involved in the vulnerability management process.

Cybersecurity Cybersecurity channel featured risk Vulnerability management
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Marc Benioff AI Report Card Includes A+ for Vision but C- for Math

June 30, 2025

OpenAI Partners with Google Cloud Amid Soaring AI Demand, Reshaping Ties with Microsoft

June 30, 2025

Dear Marc Benioff: If AI Does 50% of Work at Salesforce, Layoffs Looming?

June 30, 2025

How One Company Added 20% to Profit with Cloud Optimization

June 27, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Marc Benioff AI Report Card Includes A+ for Vision but C- for Math
  • OpenAI Partners with Google Cloud Amid Soaring AI Demand, Reshaping Ties with Microsoft
  • Dear Marc Benioff: If AI Does 50% of Work at Salesforce, Layoffs Looming?
  • AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare
  • How One Company Added 20% to Profit with Cloud Optimization

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.