Case Study

Vulnerable ? Exploitable: A lesson on prioritization

Vulnerable ? Exploitable: A lesson on prioritization

Pages 6 Pages

Horizon3.ai highlights a critical lesson in cybersecurity prioritization: not all vulnerabilities warrant immediate attention. While pen testers and scanners generate numerous alerts, data from Kenna in 2020 reveals that only 2.7% of identified vulnerabilities are exploitable, and a mere 0.4% are actively exploited. This insight helps security teams focus efforts on truly critical risks, reducing wasted time and resources by distinguishing between vulnerable and exploitable issues, ultimately enhancing the efficiency and effectiveness of vulnerability management programs.

Join for free to read