Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » In Cybersecurity, Beware Death by a Thousand Vulnerability Reports
Cybersecurity

In Cybersecurity, Beware Death by a Thousand Vulnerability Reports

Robert WoodBy Robert WoodJanuary 12, 2022Updated:January 12, 20224 Mins Read
Facebook Twitter LinkedIn Email
Vulnerability Reports
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Security has a lot of tools. We have tools to scan networks, code, open-source libraries, databases, cloud configuration, endpoints, infrastructure as code, and more. As security teams, among our key modes of communication are vulnerability reports. More specifically, identifying these issues and letting others know about them with the appropriate context so they can be fixed.

However, there are several problems with this. In this article, I’ll break down a few of them.

If a security team isn’t able to effectively communicate to others about vulnerabilities, it’s going to be very difficult to manage them. All teams have priorities, and they almost certainly include work that is not security related by design.

Note: For the purposes of this article, I think of the terms “reports” and “dashboards” somewhat interchangeably. They are meant to reference the output of a scan, whether it’s pushed or pulled by the recipients.

State Scan Over Scan

Scanning tools aren’t always consistent when it comes to tracking the state of an asset, scan over scan. Does the tool treat each scan as fresh? Does the tool track a specific instance of a vulnerability over the course of multiple scans? What happens when the asset changes in some way in between scans? Should that be considered a new vulnerability or the same one with the same vulnerabilities? How might the tool handle ephemeral infrastructure?

The point of these questions is not to highlight some “right” answer in these scenarios. Rather, to highlight that the complexities in state management are likely to be treated differently by different tools in your stack, leading towards a general inconsistency.

Risk Rating Inconsistency

The security industry, as a whole, has a wildly inconsistent way of talking about risk. This trend is amplified in industry tools and wrapped in flashy dashboards. Some tools describe risk on a numeric ordinal scale (0-100). Other tools use low, medium, and high risk rankings. Other tools incorporate CVSS scores in an attempt to quantify the risk of an issue.

Even if two tools use the same scale, they may apply the calculation leading to classification differently. This puts a tremendous amount of pressure on recipients to be able to properly interpret all of this data amidst their many other priorities.

I’ll be getting into more detail on this particular topic in a future article.

Pure Volume

As a field, we’re pushing for faster delivery and continuous delivery of software. Vulnerability scanning will inevitably need to keep up. More scanning means more frequent notifications of results—more noise.

The more our field wants to do, the more data we will generate. Without proper tuning, which not every tool makes easy to do, we risk creating a vacuum of white noise that is easy to ignore over time.

Learning and Switching Costs

The cognitive load that recipients of these reports or dashboards take on increases with each additional tool. Every tool its own UX, its own login flow, its own vulnerability interpretations.

It takes time and energy to learn a new tool, even if you’re just a consumer of the work it’s doing. It takes more time and energy to reason about the results from one tool to another. Even more than that, knowing how important some result is compared to the other work opportunities a team has, such as building a new critical feature or paying down tech debt, is hard.

More Is Not Necessarily Better

This article really scratches the surface on the myriad problems that tool overload creates. As the technology ecosystem and systems development increases in complexity, it’s likely that we’ll see this problem in some form increase with some equivalence.

More attack surface, more technology types, more tools to manage it. The answer can’t be to consistently throw more and more resources at the problem.

Cyber Security Cyber Security as An Enabler Cybersecurity channel vulnerability
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

AI Security: Practical Ways Microsoft Users Can Tap Purview to Lock Down Data in AI Use Cases

June 18, 2025

AI Agent Security: Red Teaming Emerges as Solution to Broad Range of Threat Categories

June 12, 2025

AI Agent & Copilot Podcast: Kyndryl AI Readiness Report Finds People, Orgs Have a Steep Hill to Climb

June 11, 2025

IBM Invests in NYC AI Ecosystem with Cutting-Edge Developer Hub

June 11, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.