Security OperationsAlso called: "vuln management"
Effective vulnerability management balances scan coverage with pragmatic prioritization so teams fix the issues that matter most.
Lifecycle steps
- Discover assets and the software they run.
- Assess vulnerabilities via scanning, penetration testing, and threat intelligence.
- Prioritize based on exploitability, business impact, and exposure.
- Remediate through patching, configuration changes, or compensating controls.
Modern practices
- Align findings with frameworks like CVSS, KEV, and exploit intelligence.
- Integrate with ticketing systems to assign clear owners.
- Measure patch latency for critical systems.
Related Tools
Explore More Security Operations
View all termsEndpoint Detection and Response (EDR)
Security software that monitors endpoints for malicious activity, enabling rapid detection and containment.
Read more →Managed Detection and Response (MDR)
A security service that combines technology and human expertise to detect, investigate, and respond to threats 24/7.
Read more →Security Information and Event Management (SIEM)
A platform that ingests security telemetry, correlates events, and surfaces alerts for investigation.
Read more →Security Operations Center (SOC)
A dedicated function responsible for monitoring, detecting, and responding to cybersecurity threats in real time.
Read more →Virtual Chief Information Security Officer (vCISO)
An outsourced executive who provides strategic cybersecurity leadership and governance without the cost of a full-time hire.
Read more →