Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Effective Cybersecurity Depends on Understanding How Vulnerability Scores Work
Cybersecurity

Why Effective Cybersecurity Depends on Understanding How Vulnerability Scores Work

Chris HughesBy Chris HughesOctober 21, 2022Updated:December 1, 20223 Mins Read
Facebook Twitter LinkedIn Email
vulnerability scores
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

If you’ve been working in information technology (IT) or cybersecurity for some time, you’re likely familiar with vulnerability management, a core part of protecting organizational systems and data — but do you know how vulnerabilities are scored? If not, this article will introduce you to the fundamentals, and why it’s important to understand them.

Vulnerability Databases

Before we get too deep into scoring, let’s discuss databases. Vulnerabilities are cataloged in databases. No database is more popular than the National Vulnerability Database (NVD). NVD, which has origins as far back as the 1990s, functions as a U.S. government repository of standards-based vulnerability management data. It informs vulnerability management efforts for thousands of organizations around the world. NVD is also referenced by nearly all leading security-vendor tools.

While NVD is the most widely used vulnerability database, it is far from the only one. Others, including Sonatype’s OSS Index, the Open-Source Vulnerability (OSV) Database, and Global Security Database (GSD) are quickly gaining adoption as well.

Vulnerability Scoring

Now that we know some of the primary vulnerability databases, let’s look at how the industry scores vulnerabilities.

Common Vulnerability Scoring System

The Common Vulnerability Scoring System (CVSS) is the primary way vulnerabilities are scored across the software ecosystem. CVSS is an open framework used to communicate characteristics related to a vulnerability’s severity. It uses three metric groups: Base, Temporal, and Environment — although most organizations simply use the Base scoring metrics. NVD utilizes CVSS vulnerability severity ratings to represent vulnerabilities. Based on the latest CVSS version 3.0 specification, vulnerabilities range in severity from None, Low, Medium, High, to Critical. Score-wise, the range goes from 0.0 (None) to 9.0-10.0 (Critical).

Despite CVSS’s widespread adoption, it is nevertheless the target of some significant critiques of its scoring framework and its implementation within the industry. Industry leaders such as exposure management company Tenable have pointed out that more than 50 percent of vulnerabilities scored as High or Critical are never actually exploited. This is problematic given that most organizations prioritize vulnerability management efforts around the CVSS score and severity. Doing so means these organizations could be putting significant time into addressing vulnerabilities that never pose an exploitation risk.

Exploit Prediction Scoring System

As CVSS critiques have grown, the Exploit Prediction Scoring System (EPSS) has emerged. EPSS, much like CVSS, is another open effort, but rather than scoring severity, it aims to estimate the likelihood (probability) that a software vulnerability gets exploited in the wild. This difference helps organizations maximize their limited resources and time by allowing them to focus on vulnerabilities that aren’t just the most severe or highest scored via CVSS but on those that pose the greatest risk of exploitation.

Some have advocated for combining CVSS and EPSS to maximize the impact and return on investment when it comes to organizational efforts and cybersecurity effectiveness. By combining the two efforts, businesses can more accurately drive down organizational risk.

Final Thoughts

Utilizing accurate data is critical as cybersecurity faces demand to “speak the language of the business.” Speaking the language of business requires quantifying risk, understanding vulnerabilities and their associated risk objectively, and then communicating the risk in relatable terms.

As mentioned in earlier articles this month, cybersecurity is maturing to move away from subjective qualitative risk assessments and communication and towards more objective, quantified risk assessment frameworks. This move will improve the quality of the information that cybersecurity leaders communicate to their business peers as well as make it more digestible and actionable.

Join us on October 27, 2022 for Acceleration Economy’s Data Modernization Digital Battleground, a digital event in which four leading cloud vendors answer questions on key considerations for updating data strategies and technology. Register for free here.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity data database featured vulnerability Vulnerability management
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software

June 20, 2025

Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators

June 20, 2025

Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure

June 20, 2025

The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster

June 19, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software
  • Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators
  • Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure
  • The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster
  • Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.