{"id":53453,"date":"2022-08-01T09:25:46","date_gmt":"2022-08-01T01:25:46","guid":{"rendered":"https:\/\/version-2.com\/?p=53453"},"modified":"2022-08-01T12:08:52","modified_gmt":"2022-08-01T04:08:52","slug":"risk-based-vulnerability-management-challenges-solutions-to-overcome-them","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/08\/risk-based-vulnerability-management-challenges-solutions-to-overcome-them\/","title":{"rendered":"Risk-Based Vulnerability Management Challenges &#038; Solutions to Overcome Them"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"53453\" class=\"elementor elementor-53453\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/07\/vulnerability-management-tile.png\" alt=\"\" width=\"500\" height=\"auto\"><\/p>\n<p>In today\u2019s cyber landscape, efficient <a href=\"https:\/\/www.techopedia.com\/definition\/16172\/vulnerability-management\" target=\"_blank\" rel=\"noopener\">vulnerability management<\/a> is a top priority. Organizations cannot afford to take chances with cyber-attacks on the rise and the increasing sophistication of malicious actors. Unfortunately many hold the wrong perspective of vulnerability management (VM) which can cause &nbsp;recurring security challenges and &nbsp;for organizations.&nbsp;<\/p>\n<p>In many cases targeted threat actors or untargeted <a href=\"https:\/\/www.portnox.com\/blog\/how-to-protect-your-network-against-ransomware-attack\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a> attackers take advantage of an organization\u2019s inaction. They infiltrate a network to disrupt operations, primarily for financial gain. No company should handle these issues with a kid\u2019s glove. Looking at today\u2019s threatscape, <a href=\"https:\/\/securityboulevard.com\/2022\/07\/overcoming-risk-based-vulnerability-management-rbvm-challenges\/\" target=\"_blank\" rel=\"noopener\">RBVM<\/a> is critical in knowing how to combat the menace of cyber threats.&nbsp;<\/p>\n<h3><b>Common Vulnerability Management Challenges &amp; a Lasting Solution<\/b><\/h3>\n<p><b>1. Insufficient Asset Inventory: <\/b>We all know how challenging it is to protect what you can\u2019t see. One major factor facing most organizations is the incomplete <a href=\"https:\/\/www.safebreach.com\/resources\/security-posture-101-a-guide-to-it-asset-inventory-thinking-2\/\" target=\"_blank\" rel=\"noopener\">asset inventory<\/a> data at their disposal. At best, storage often occurs in obsolete spreadsheets or other methods. Unfortunately, the result is often incomplete or incorrect data. What organizations require is concise and up-to-the-minute data on their assets.<\/p>\n<p>A company that utilizes robust asset inventory management solutions is on the road to successful vulnerability management. Asset inventories help to determine the scope of potential risks, and how to patch them safely. In-depth context on a company\u2019s assets produces a formidable vulnerability analysis and prioritization. On the other hand, &nbsp;insufficiently detailed asset profiling can make the process rather cumbersome.&nbsp;<\/p>\n<p><b>2. Inaccurate and Inefficient Prioritization of Vulnerabilities: <\/b>Undoubtedly, most IT environments of organizations experience a large number of vulnerabilities. The threats range in scope and potential damage- which puts an arduous task on the security team to patch or fix. An essential factor to consider remains the exploitation or value of an asset. Therefore, a <a href=\"https:\/\/www.darkreading.com\/risk\/risk-based-prioritization-adds-new-depth-to-vulnerability-management\" target=\"_blank\" rel=\"noopener\">risk-based prioritization<\/a> into low, medium, high, and critical-risk vulnerabilities becomes expedient.&nbsp;<\/p>\n<p>Every organization needs to check the connection between vulnerabilities and the presence of public exploits. Also, consider any attack with the sole aim of detecting the vulnerability of a network. Such actions help to focus more on the severity and urgency of every vulnerability.&nbsp;<\/p>\n<p><b>3. Difficulty in Detecting Vulnerabilities: <\/b>Many companies use vulnerability scanning to identify weaknesses within a network to prevent the exploitation of their infrastructure. Unfortunately, while the method is suitable, it is not the most effective. Moreover, vulnerability scanning can come with specific challenges.<\/p>\n<p>First, it disrupts or disables operations completely. Organizations often work with integrated systems; such disruption leads to the eventual tripping of the entire system infrastructure. Another challenge comes in the form of huge gaps between scans. The infrequency of scans during downtimes makes them out at the end of each process. This can lead to &nbsp;an incomplete picture of the actual vulnerability. Furthermore, there\u2019s reduced accuracy during the process since vulnerability scanning comes with settings. These settings help to decrease the function or force of a scan.&nbsp;<\/p>\n<p>What organizations need is a robust identification and tracking mechanism for vulnerabilities. Multiple agencies and services provide &nbsp;penetration testing. Such platforms help to safely discover vulnerabilities within an organization.&nbsp;<\/p>\n<p><strong>4.<\/strong> <b>The Use of Outdated Scanning Methods: <\/b>One VM challenge is the use of outdated scanning tools or manual scanning. Such methods include authenticated scanning, unauthenticated scanning, and agent-based scanning.&nbsp;<\/p>\n<p>Manual processes are time-consuming, thereby increasing the effort to perform scans. The outcome is a decline in accuracy and effectiveness since the &nbsp;scan report &nbsp;results are often redundant and inaccurate, with higher false positives and human errors.<\/p>\n<p><b>5. Lack of a Unified View of Vulnerabilities: <\/b>Organizations use various methods and scanners to detect vulnerabilities. Some of these include agent-based, authenticated, and unauthenticated scanning. The challenge is that each operates on its own. As a result, this leads to treating each vulnerability in disconnected systems. The inability to unify all vulnerabilities from multiple sources into a central system makes tracking and remediation difficult. Instead, what most companies need to gun for is a single unified view of vulnerabilities.<\/p>\n<p><b>6. Untimely Remediation of Vulnerabilities: <\/b>The remediation process of most organizations is a slow one. It takes an average of 100 days to remediate a vulnerability. The consequence is that it gives attackers a large window of opportunity to operate. However, software patching occurs daily or weekly, as the case may be. It is a complex and time-consuming process.<\/p>\n<p>&nbsp;Remediating vulnerabilities comes from patching, updating software, and bug fixes . The challenge is that many organizations\u2019 pace with addressing or fixing vulnerabilities is often relatively slow. Effective vulnerability management involves patch automation controlled by a team of experts.<\/p>\n<p><b>7. Lack of Vulnerability Asset Mapping: <\/b>Many organizations fail to list all assets at their disposal, making it challenging to match vulnerabilities during analysis. However, the process is a must to get them prioritized for remediation. Vulnerability asset mapping helps to determine the attack surface of an organization. Such information is vital in providing visibility to the vulnerability landscape and allows the security team to gain a clear idea of the affected assets.<\/p>\n<p><b>8. An Episodic Approach to Vulnerability Management: <\/b>The vulnerability management approach for most companies is sporadic. As a result, controlling the flow of vulnerability becomes challenging. A progressive approach is a prerequisite to reducing vulnerability management risks. It would certainly not do any good to work with a backlog of security issues and incur more vulnerability debt. Instead, the goal should be to improve and harden the security posture.<\/p>\n<h3><b>Tracking the VM Process<\/b><\/h3>\n<p>Most organizations conduct one-time vulnerability assessments due to the manual effort involved. This process challenges the security team in managing the entire VM process from &nbsp;beginning to the end. One of the reasons is that it\u2019s hard to keep track of the entire process whether it\u2019s making patches or keeping track of asset inventories, vulnerabilities, and remediation. It also entails updating information in real-time, refreshing relevant data, and more; the entire manual process can be quite cumbersome.&nbsp;&nbsp;<\/p>\n<h3><b>Final Thoughts<\/b>&nbsp;<\/h3>\n<p>As much as we agree that VM challenges are part of the VM process, they shouldn\u2019t be recurring. Where they are, organizations must take action. These challenges become easy to overcome with improved security tools and services. &nbsp;Accurate Risk-Based Vulnerability Management requires contextualizing vulnerability intelligence (VI) to an organization\u2019s assets that is comprehensive, detailed, and timely.&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s cyber landscape, efficient vulnerability man [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,488,61],"tags":[352,423,489],"class_list":["post-53453","post","type-post","status-publish","format-standard","hentry","category-portnox","category-488","category-press-release","tag-network","tag-portnox","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Risk-Based Vulnerability Management Challenges &amp; Solutions to Overcome Them - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk-Based Vulnerability Management Challenges &amp; Solutions to Overcome Them - Version 2\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s cyber landscape, efficient vulnerability man [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T01:25:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-01T04:08:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/07\/vulnerability-management-tile.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/risk-based-vulnerability-management-challenges-solutions-to-overcome-them\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Risk-Based Vulnerability Management Challenges &#038; Solutions to Overcome Them\",\"datePublished\":\"2022-08-01T01:25:46+00:00\",\"dateModified\":\"2022-08-01T04:08:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/risk-based-vulnerability-management-challenges-solutions-to-overcome-them\\\/\"},\"wordCount\":1063,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/vulnerability-management-tile.png\",\"keywords\":[\"Network\",\"Portnox\",\"2022\"],\"articleSection\":[\"Portnox\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/risk-based-vulnerability-management-challenges-solutions-to-overcome-them\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/\",\"name\":\"Risk-Based Vulnerability Management Challenges & Solutions to Overcome Them - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/vulnerability-management-tile.png\",\"datePublished\":\"2022-08-01T01:25:46+00:00\",\"dateModified\":\"2022-08-01T04:08:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/vulnerability-management-tile.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/vulnerability-management-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/risk-based-vulnerability-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk-Based Vulnerability Management Challenges &#038; Solutions to Overcome Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risk-Based Vulnerability Management Challenges & Solutions to Overcome Them - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/","og_locale":"en_US","og_type":"article","og_title":"Risk-Based Vulnerability Management Challenges & Solutions to Overcome Them - Version 2","og_description":"In today\u2019s cyber landscape, efficient vulnerability man [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/","og_site_name":"Version 2","article_published_time":"2022-08-01T01:25:46+00:00","article_modified_time":"2022-08-01T04:08:52+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/07\/vulnerability-management-tile.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/08\/risk-based-vulnerability-management-challenges-solutions-to-overcome-them\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Risk-Based Vulnerability Management Challenges &#038; Solutions to Overcome Them","datePublished":"2022-08-01T01:25:46+00:00","dateModified":"2022-08-01T04:08:52+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/08\/risk-based-vulnerability-management-challenges-solutions-to-overcome-them\/"},"wordCount":1063,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/07\/vulnerability-management-tile.png","keywords":["Network","Portnox","2022"],"articleSection":["Portnox","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/08\/risk-based-vulnerability-management-challenges-solutions-to-overcome-them\/","url":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/","name":"Risk-Based Vulnerability Management Challenges & Solutions to Overcome Them - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/07\/vulnerability-management-tile.png","datePublished":"2022-08-01T01:25:46+00:00","dateModified":"2022-08-01T04:08:52+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/07\/vulnerability-management-tile.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2022\/07\/vulnerability-management-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/risk-based-vulnerability-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Risk-Based Vulnerability Management Challenges &#038; Solutions to Overcome Them"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-dU9","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=53453"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53453\/revisions"}],"predecessor-version":[{"id":53457,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53453\/revisions\/53457"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=53453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=53453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=53453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}