Why ‘Vulnerability Management’ Was Always the Wrong Name for the Job

Scott Kuffer
July 30, 2025
Industry Perspectives
Vuln Management Name Blog

Let’s get this out of the way: the term vulnerability management has always been misleading. 

It evokes the idea that we’re wrangling a tidy list of software flaws, checking boxes, patching holes, and keeping things humming. But anyone who’s worked in the trenches or tried to explain this chaos to an executive board knows the truth. What we call “vulnerability management” isn’t a single discipline, or even a well-contained function. It’s an overloaded, misunderstood label for a sprawling operational challenge that spans threat intel, asset management, engineering velocity, business risk, and human behavior. 

And slapping a name on it hasn’t made it any easier to solve. 

I thought about this concept as I was preparing my talking points for a podcast interview with Risky Business on the evolution of vulnerability management. It struck me that the term itself was wrong, and that we need to change how we think about solving it. 

The Real Problem Isn’t Cyber — It’s the Business Architecture 

Let’s start with the data. Every modern enterprise is drowning in security findings. They come from scanners, bug bounty platforms, CI/CD pipelines, cloud providers, and more. The signal is there. The risk is real. But nothing moves because the information lives in silos, owned by different teams, structured in different ways, and valued by different stakeholders. 

That’s not a security issue. That’s a business integration failure. 

We’ve seen this story before. Think about how long it took for organizations to extract meaningful value from their business intelligence tools. The dashboards came easy. The decisions didn’t. Why? Because you can’t optimize across fractured systems. If your HR systems, CMDB, code repositories, and production telemetry don’t speak the same language, there’s no amount of security tooling that will make your vulnerability data actionable. 

This is why the most successful programs we’ve seen aren’t winning because of a better scanner; for example, one US state agency consolidating risk efforts across 67 agencies. They’re winning because they solved the underlying problem first. 

Threat Intel Is Catching Up. Business Context Still Isn’t. 

Everyone likes to talk about enriching findings with threat intelligence. Thanks to AI and more open access to external data, pulling in fresh indicators of exploitability is increasingly viable at scale. We’re moving toward a future where that part of the enrichment pipeline will run itself. 

But business context? That’s still the Wild West. 

You can’t enrich technical data with business impact unless your systems know what the business looks like. They need to understand what’s critical, who owns what, and what’s in flux. And most security teams don’t have access to that information in any structured, dynamic way. The org chart changes. The asset inventory is incomplete. And the only time security gets a full picture is during an incident … when it’s too late. 

The real unlock here isn’t more threat feeds. It’s tearing down the wall between cyber and the business itself. The creation of roles like the Business Information Security Officer, or BISO, wasn’t just cosmetic. It was a signal that alignment is mandatory. But the tooling still hasn’t caught up. 

This Was Never Just About CVEs 

Another reason “vulnerability management” is a misnomer? It assumes that CVEs are the beginning and end of the risk equation. 

They’re not

The real world is messier. You’ve got misconfigurations, secrets in source code, exposed S3 buckets, unsanctioned SaaS, supply chain dependencies, and security researcher findings, all of which can be exploitable and business-critical. If you limit your VM program to what shows up in your vulnerability management scanner, or even a few scanners, you’re already behind. 

That’s why Nucleus has always treated this as a vulnerability operations problem. Not a subdomain of patch management. Not a sub-ticket on a JIRA board. It’s a full-spectrum coordination layer across the entire technical stack. That’s where our integrations, like the one with Bugcrowd, come in. We’re not just piping in signal. We’re helping teams act on it quickly, with full context, and across teams that don’t always speak the same language. 

The Boardroom Doesn’t Care About CVSS 

One of our early assumptions at Nucleus was that we could just be the backend. Let the customer handle the reporting and storytelling. 

That was wrong. 

As it turns out, most security reporting still doesn’t bridge the language gap with leadership. And the solution isn’t to drown execs in dashboards or throw them sanitized summaries of scan results. It’s to anchor your reporting to something they already understand: business KPIs. It’s about answering questions like these: 

  • What’s our exposure against our critical assets?
  • How fast are we responding to threats that match our threat model?  
  • How efficiently are we driving down real risk? 

If you can’t answer that in a single metric and show how it changes over time, then it’s just noise. The goal is to get from “here’s a thousand findings” to “here’s what matters, and here’s what’s being done.” 

The Future Is Fewer Buckets, Not More People Carrying Them 

The industry has done a decent job on prioritization. Most mature teams can tell you which 1 out of every 10 vulnerabilities really matters. 

But even those don’t get fixed fast enough, and the volume of findings isn’t going down. Every tool is its own silo of data, and right now we’ve got people walking around with buckets, collecting what they can from each system. The problem? Each person can only carry so much at a time. 

So now what? 

We believe the future of this space isn’t just faster prioritization. At some point, we’ll need to remove humans from the initial triage loop entirely. We’re wasting talent on ticket-wrangling, copy/paste operations, and cross walking spreadsheets. That work should be owned by systems. Humans should be managing outcomes, not incidents

This shift won’t be easy. But it’s overdue. And if we don’t start now, the gap between threat and response is only going to grow. 

Let’s Stop Pretending the Name Still Fits 

“Vulnerability management” made sense when we had a few scanners and a manageable number of known software flaws. That world doesn’t exist anymore. 

Today, exposure lives everywhere. You can find it in code, in configs, in ephemeral cloud assets, and in human error. Managing it means aggregating, enriching, and acting at scale, with context and coordination baked in. That’s not VM. That’s operations. That’s risk strategy. That’s business execution. 

So maybe it’s time we stop trying to fix vulnerability management and start replacing it with something that actually works. 

Scott Kuffer
Scott is the co-founder and Chief Product Officer of Nucleus Security, a leading provider of risk-based vulnerability management solutions. With a wealth of experience in cybersecurity, SaaS, and business strategy, he has been at the forefront of driving innovation in vulnerability management, helping some of the world’s most complex enterprises tackle their biggest security challenges.

See Nucleus in Action

Discover how unified, risk-based automation can transform your vulnerability management.