DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Related

  • Agentic AI for Automated Application Security and Vulnerability Management
  • On SBOMs, BitBucket, and OWASP Dependency Track
  • Building Secure Containers: Reducing Vulnerabilities With Clean Base Images
  • A Practical Approach to Vulnerability Management: Building an Effective Pipeline

Trending

  • Evolution of Cloud Services for MCP/A2A Protocols in AI Agents
  • The Role of Retrieval Augmented Generation (RAG) in Development of AI-Infused Enterprise Applications
  • STRIDE: A Guide to Threat Modeling and Secure Implementation
  • Getting Started With GenAI on BigQuery: A Step-by-Step Guide
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Navigating the Evolving Landscape of Vulnerability Management

Navigating the Evolving Landscape of Vulnerability Management

VulnCheck leaders share insights on navigating the challenges of vulnerability management at scale through automation, data sharing, and collaboration.

By 
Tom Smith user avatar
Tom Smith
DZone Core CORE ·
Mar. 27, 24 · Analysis
Likes (1)
Comment
Save
Tweet
Share
1.1K Views

Join the DZone community and get the full member experience.

Join For Free

As the volume and complexity of software vulnerabilities continue to grow exponentially, developers, engineers, and architects face increasing challenges in keeping their applications and systems secure. I sat down with Patrick Garrity, Security Researcher, and Anthony Bettini, CEO at VulnCheck during CVE/FIRST VulnCon 2024, to discuss the current state of vulnerability management and how their company is innovating to help technology professionals stay ahead of the curve.

The Challenge of Increasing Vulnerabilities

One of the key trends that VulnCheck is seeing is an exponential increase in disclosed software vulnerabilities that shows no signs of slowing down. Garrity explained that a major factor behind this growth is the spread of responsible disclosure practices — more organizations are proactively disclosing vulnerabilities that they previously would not have reported. 

While this is a positive trend for security overall, it presents significant scalability challenges for the manual processes used by many organizations to track and triage vulnerabilities today. Even the U.S. National Vulnerability Database (NVD) run by NIST is struggling to keep up with the growing backlog due to budget constraints. 

Automating Vulnerability Intelligence

To address this challenge, VulnCheck is focused on collecting, processing, and sharing vulnerability data in an automated and scalable way. "There is tons of information out there, like an ungodly amount of information," explained Garrity. "Probably the biggest thing is how you collect the process of that information in a way that can be consumed."

VulnCheck ingests data from various sources beyond the NVD and makes it freely available to the community through open APIs, detailed blog posts, and other resources. The goal is to give organizations a "head start" on vulnerability awareness so they can begin remediation 20–30 days before intelligence enters the NVD and other official sources.

"If nothing else, and we're trying to make that freely available to the community," said Bettini. "Because effectively, no one steps into the problem that backlog will continue to grow and the impact of that backlog affects national security."

Putting EPSS Scores in Context

Garrity also shared insights from his involvement in FIRST's Exploit Prediction Scoring System (EPSS) Special Interest Group. EPSS aims to predict the probability that a vulnerability will be exploited in the wild within the next 30 days. However, Garrity cautioned that many organizations misunderstand and misuse EPSS data.

"There's a lot of misunderstanding around probability," he explained. "People often are like, 'Oh, well, I'm going to use it just like I use CVSS. If it's a 0.7 or higher, I will fix it.' When discussing probability, a vulnerability with a 70% chance of being exploited in the next 30 days, like maybe you want to set those thresholds a lot lower."

He advises using EPSS as one of many factors to identify vulnerabilities that warrant further investigation but not as an automatic priority score. When EPSS shows an elevated probability, security teams should look for other evidence, such as active exploitation in the wild or available proofs-of-concept, to make a risk-based prioritization decision.

Bridging the Gap Between Security and Developers

Another common challenge that VulnCheck sees its customers facing is how vulnerability management (VM) teams can effectively communicate security issues to developers. Bettini highlighted how developers often struggle to translate vulnerability scores into meaningful priorities.

"The vulnerability management teams say, 'Oh, we understand our scoring system. We understand what 1-2-3-4-5-6-7-8-9-10 means,' but then they go to a software developer and say, 'I want you to fix this vulnerability because my system says it's a 9.' And that 9 means absolutely nothing to the developer," said Bettini.

Garrity advises VM teams to spend more time collaborating with and understanding the processes of their developer, operations, and product security counterparts to drive better remediation outcomes. Context is key. "To really get someone to take action, you need to have evidence," he said. "You need to say, 'Hey, this vulnerability, we know is being exploited by these threat actors' or 'This vulnerability has some proof of recently developed concepts'... That actually is something meaningful that now I can internalize and then take action."

Realizing the Potential of AI and Machine Learning

While artificial intelligence (AI) and machine learning (ML) are increasingly being hyped as game-changers for vulnerability management, Garrity and Bettini expressed a mix of optimism and healthy skepticism about their near-term potential. 

They see great value in using AI/ML models trained on carefully curated vulnerability datasets to reduce manual effort and augment human decision-making. VulnCheck provides clean, labeled data that its customers can use to train models to support contextual prioritization based on their environment and risk tolerances. 

However, the VulnCheck leaders cautioned against an over-reliance on AI/ML and "bolted-on" solutions. "I think that people generally misinterpret its value," said Garrity. "Because they don't know how to build the right solution, they are going to use AI than to try and come up with a solution... within like five minutes, I can find you hundreds of corner cases where the inferences they're providing is wrong, inaccurate."

Looking Ahead

As the pace and complexity of software vulnerabilities continue to increase, it's clear that automation, data sharing, and cross-team collaboration will be essential to helping development and security teams keep up.

Forward-thinking leaders like those at VulnCheck demonstrate how a community-oriented approach combining automated data collection, actionable intelligence, and intuitive workflows can streamline vulnerability management and help teams focus their limited resources more effectively. By helping to bridge the gaps between vulnerability disclosures, security operations, and the development lifecycle, innovative tooling can play a key role in securing the applications that power our digital world.

Vulnerability security

Opinions expressed by DZone contributors are their own.

Related

  • Agentic AI for Automated Application Security and Vulnerability Management
  • On SBOMs, BitBucket, and OWASP Dependency Track
  • Building Secure Containers: Reducing Vulnerabilities With Clean Base Images
  • A Practical Approach to Vulnerability Management: Building an Effective Pipeline

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!