Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Contextual Analysis Zeroes in on the Most Exploitable AppSec Vulnerabilities
Cybersecurity

How Contextual Analysis Zeroes in on the Most Exploitable AppSec Vulnerabilities

Chris HughesBy Chris HughesFebruary 3, 2023Updated:February 5, 20234 Mins Read
Facebook Twitter LinkedIn Email
appsec vulnerability management
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Anyone who works in application security (AppSec) knows the pain of vulnerability management. You work with the development team, as well as product and system owners, to get vulnerabilities mitigated or remediated, and then new scans run, and new vulnerabilities are found.

This infinite loop of toil and tension drains the development team’s time and focus and fosters resentment. People come to see security as always introducing problems and slowing down delivery of new features to production — and delivery velocity is a critical development team metric.

This is why contextual analysis is critical to AppSec. Contextual analysis can provides can provide critical information to help teams prioritize vulnerabilities and make the best use of their limited resources. That information includes:

  • whether the dependency/code is reachable and in the attack path
  • whether an exploit is available, and if so, at what level of maturity
  • whether an exploit is used in the wild successfully, and more.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

Bring Signal to the Noise

Development teams have little time and attention to spare and, traditionally, in security, we demand both, and often for vulnerabilities with no actual context or details. This is incredibly problematic when we also realize that most vulnerabilities, often classified as Common Vulnerabilities and Enumerations (CVEs) and captured in vulnerability databases such as the National Institute of Standards and Technology National Vulnerability Database (NIST NVD), aren’t actually exploitable.

This means the vulnerabilities often don’t pose any real risk to the business, but without contextual analysis, it’s hard to tell the difference between what’s exploitable or not. This results in a lot of wasted time and a cognitive drain on the team.

Research the top 10 cybersecurity providers selected by our practitioner analysts

Luckily, the industry is realizing the folly of the legacy approach of using base Common Vulnerability Scoring System (CVSS) scores without accounting for actual exploitability or environmental context because it’s inefficient and ineffective.

We’re starting to see greater use of resources such as Cybersecurity and Infrastructure Security Agency’s (CISAs) Known Exploited Vulnerabilities (KEV) catalog, which provides a list of known exploited vulnerabilities, emerging. This allows federal agencies and any other organization to prioritize those vulnerabilities for remediation.

CISA has also been championing the Stakeholder-Specific Vulnerability Categorization (SSVC) calculator, a collaboration with Carnegie Mellon University (CMU), as another resource organizations can use to prioritize vulnerability remediation.

We’re also seeing the emergence of the Exploit Prediction Scoring System (EPSS). Run by the same organization that runs the CVSS, the EPSS helps provide probability scores associated with CVEs. The EPSS shows the probability that a CVE will actually be exploited, going beyond just a blanket severity rating.

We’re also seeing vendors start to provide capabilities such as reachability analysis, which provides insight into whether or not vulnerable code is actually reachable within the application’s code base. This can help the security and development teams prioritize specific aspects of the code for remediation and allow development teams to perhaps seek out other, less vulnerable and exploitable components to include in their applications.

Final Thoughts

When you combine these capabilities of integrating contextual analysis to vulnerabilities through open source software (OSS) tooling, vendor products, or internally developed capabilities, you position your organization to spend your time and effort on the vulnerabilities that pose the largest risk to the organization — and therefore should be addressed first.

This drives down organizational risk, saves resources, and minimizes the strain on development teams. It also reduces the friction between development and security, with developers understanding that the items they’re being asked to address actually pose a risk and aren’t based on subjective scoring or metrics without context.

Time is limited, and it is best spent on vulnerabilities that pose real risk while not impeding development velocity and business outcomes that are enabled by software.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

apps Cybersecurity security software development Vulnerability management
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Microsoft Deepens Global AI Ambitions Through Strategic Investments in South Korea and Thailand

April 9, 2026

How ServiceNow Is Scaling Secure AI with Zenity Integration

April 8, 2026

Google Cloud Bets on Agentic AI to Redefine Cybersecurity

April 1, 2026

SAP Pumps Up Agentic AI and Data Chops with Reltio Acquisition

March 31, 2026
Add A Comment

Comments are closed.

Recent Posts
  • Hyperscaler Q1 Preview: Google Cloud Will Keep Outgunning Microsoft, AWS
  • Google Cloud, AWS, Microsoft Q1 Preview: Who’s Hot + Who’s Cool?
  • Google Launches Gemma 4, Bringing Frontier AI Capabilities to Local and Mobile Devices
  • Multi-Agent Updates in Copilot Studio Simplify Connections To Fabric, Microsoft 365 Data
  • Microsoft’s AI Strategy: Infrastructure, Talent, and Data Sovereignty in Japan

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

Accounts Payable Reimagined: ERP-Native Automation in Dynamics 365

March 30, 2026

elevaite365 Test Automation: Turning Software Testing into a Strategic Asset with AI

March 6, 2026

Driving Business Transformation with Agentic AI and ServiceNow

January 9, 2026

The Agentic Enterprise: How Microsoft and Industry Leaders Are Redefining Work Through AI

September 2, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }