This document discusses using data to understand cybersecurity vulnerabilities and risks. It summarizes data from various sources on over 23 million vulnerabilities across 1 million assets. It analyzes patterns in the data related to duplication of findings, vulnerability density by asset type, and time to remediation by CVSS score. It also examines live breach data and estimates the probability that an open vulnerability will be exploited based on attributes like its CVSS score or presence in exploit databases. The document advocates taking a data-driven approach to prioritizing security issues and estimating real-world risks.
Related topics: