Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Seeking a Simpler User Journey for Vulnerability Management
Cybersecurity

Seeking a Simpler User Journey for Vulnerability Management

Robert WoodBy Robert WoodJanuary 28, 2022Updated:January 28, 20224 Mins Read
Facebook Twitter LinkedIn Email
Vulnerability Management
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The idea of infusing simplicity into a design is not new. We see this trend in products all over from user interfaces, physical products, mobile devices, and user journeys. At the same time, there’s always a desire for more, fueling feature or tool creep and information overload. This theme certainly rings true in cybersecurity.

There are hundreds, if not thousands of tool options for identifying vulnerabilities and reporting on them. Each tool has its own unique interface and its own risk interpretation. They are also likely looking at different slices of a technology stack or environment. Attempting to manage all of those layers within a single tool is complex. Taken in and layered together across different solutions, that complexity becomes needlessly untenable and even more complex.

Within the domains of user experience (UX) and human-centered design (HCD) there is a concept of managing cognitive load for users. There are two key forms of cognitive load [1]:

  1. Intrinsic cognitive load is the effort taken to absorb new information and keep track of goals.
  2. Extraneous cognitive load is processing that consume mental resources but doesn’t aid in understanding the content.

A simple example of extraneous cognitive load is the use of different colors within a tool that doesn’t actually convey meaning. Circling back to a recent article on tool-driven risk confusion. A user attempting to derive prioritization out of conflicting colors and scores adds unnecessary cognitive load. The unified vulnerability management (UVM) tools segment has the potential to improve this situation. These solutions, such as Kenna Security and Nucleus Security both provide commercial offerings to aggregate and streamline vulnerability management programs.

Broadly speaking, UVM tools have focused on a couple of core problems.

  • Aggregate vulnerability data using connectors to different security tools
  • Instrument security tools directly to generate and then collect data
  • Display vulnerability data from different tool sources in one view to the user

For the purposes of this discussion, the instrumentation is not relevant. We will focus on minimizing cognitive load, aggregating data together, normalizing it, and displaying it inside of a single view. Following a hypothetical organization with a security tools portfolio, a deployment could look like this.

In this scenario, there are 8 reports, 8 risk assessments, and 8 different user experiences consolidated into 1. That’s a lot of cognitive load removed for those teams working on vulnerability remediation. While focused on the same core problem set, commercial and open source solutions naturally vary in their approaches to key features. If you are evaluating this approach to vulnerability management in your environment here are some key areas to focus on:

  • De-duplication of vulnerabilities: Tools or security processes (e.g., penetration testing) can sometimes identify the same issues as another. A solution should have the ability to identify these similar issues and consolidate them into unique vulnerabilities. This ensures that a developer is not doing extra work to prioritize, fix, and report out on duplicate issues.
  • Threat intelligence enrichment: Mapping vulnerabilities to threat intelligence feeds, commercial or custom. This can help teams further prioritize vulnerabilities beyond assigned risk ratings to understand where exploits exist or what’s being actively exploited in the wild.
  • Asset management correlation: To ensure a team understands what a reported vulnerability actually affects, a solution needs to have a robust asset management model. How does it handle ephemeral resources? How about duplicative IP addresses utilized in different data centers or cloud environments?
  • Integration support: This one seems obvious, but ensuring that the technology stack you use is supported out of the box or with relative ease (e.g., a well documented and open API) is essential. If a security team cannot integrate its entire stack then this consolidation of extraneous cognitive load will struggle.

As technologies continue to evolve, vulnerability management will adapt and follow. It is essential that security teams not let this constant change lead to constantly growing complexity for the development teams they engage with. The approach outlined in this article is one way to approach the problem, it is certainly not the only viable one. The important takeaway is that teams consider the user journey that developers go through to receive, understand, prioritize, and address vulnerabilities.

Cybersecurity Cybersecurity channel Cybersecurity is an Enabler devsecops featured Risk Management Vulnerability management
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications

May 12, 2025

How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation

May 12, 2025

Bill McDermott Channels Satya Nadella: AI Agents Will Turn Apps Into CRUD

May 12, 2025

Microsoft Adopts A2A Protocol, Agentic AI Era Begins

May 9, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications
  • How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation
  • Bill McDermott Channels Satya Nadella: AI Agents Will Turn Apps Into CRUD
  • Microsoft Adopts A2A Protocol, Agentic AI Era Begins
  • AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.