Why āVulnerability Managementā Was Always the Wrong Name for the Job
Letās get this out of the way: the term vulnerability management has always been misleading.
It evokes the idea that weāre wrangling a tidy list of software flaws, checking boxes, patching holes, and keeping things humming. But anyone whoās worked in the trenches or tried to explain this chaos to an executive board knows the truth. What we call āvulnerability managementā isnāt a single discipline, or even a well-contained function. Itās an overloaded, misunderstood label for a sprawling operational challenge that spans threat intel, asset management, engineering velocity, business risk, and human behavior.
And slapping a name on it hasnāt made it any easier to solve.
I thought about this concept as I was preparing my talking points for a podcast interview with Risky Business on the evolution of vulnerability management. It struck me that the term itself was wrong, and that we need to change how we think about solving it.
The Real Problem Isnāt Cyber ā Itās the Business Architecture
Letās start with the data. Every modern enterprise is drowning in security findings. They come from scanners, bug bounty platforms, CI/CD pipelines, cloud providers, and more. The signal is there. The risk is real. But nothing moves because the information lives in silos, owned by different teams, structured in different ways, and valued by different stakeholders.
Thatās not a security issue. Thatās a business integration failure.
Weāve seen this story before. Think about how long it took for organizations to extract meaningful value from their business intelligence tools. The dashboards came easy. The decisions didnāt. Why? Because you canāt optimize across fractured systems. If your HR systems, CMDB, code repositories, and production telemetry donāt speak the same language, thereās no amount of security tooling that will make your vulnerability data actionable.
This is why the most successful programs weāve seen aren’t winning because of a better scanner; for example, one US state agency consolidating risk efforts across 67 agencies. Theyāre winning because they solved the underlying problem first.
Threat Intel Is Catching Up. Business Context Still Isnāt.
Everyone likes to talk about enriching findings with threat intelligence. Thanks to AI and more open access to external data, pulling in fresh indicators of exploitability is increasingly viable at scale. Weāre moving toward a future where that part of the enrichment pipeline will run itself.
But business context? Thatās still the Wild West.
You canāt enrich technical data with business impact unless your systems know what the business looks like. They need to understand whatās critical, who owns what, and whatās in flux. And most security teams donāt have access to that information in any structured, dynamic way. The org chart changes. The asset inventory is incomplete. And the only time security gets a full picture is during an incident ⦠when itās too late.
The real unlock here isnāt more threat feeds. Itās tearing down the wall between cyber and the business itself. The creation of roles like the Business Information Security Officer, or BISO, wasnāt just cosmetic. It was a signal that alignment is mandatory. But the tooling still hasnāt caught up.
This Was Never Just About CVEs
Another reason āvulnerability managementā is a misnomer? It assumes that CVEs are the beginning and end of the risk equation.
The real world is messier. Youāve got misconfigurations, secrets in source code, exposed S3 buckets, unsanctioned SaaS, supply chain dependencies, and security researcher findings, all of which can be exploitable and business-critical. If you limit your VM program to what shows up in your vulnerability management scanner, or even a few scanners, youāre already behind.
Thatās why Nucleus has always treated this as a vulnerability operations problem. Not a subdomain of patch management. Not a sub-ticket on a JIRA board. Itās a full-spectrum coordination layer across the entire technical stack. Thatās where our integrations, like the one with Bugcrowd, come in. Weāre not just piping in signal. Weāre helping teams act on it quickly, with full context, and across teams that donāt always speak the same language.
The Boardroom Doesnāt Care About CVSS
One of our early assumptions at Nucleus was that we could just be the backend. Let the customer handle the reporting and storytelling.
That was wrong.
As it turns out, most security reporting still doesnāt bridge the language gap with leadership. And the solution isnāt to drown execs in dashboards or throw them sanitized summaries of scan results. Itās to anchor your reporting to something they already understand: business KPIs. Itās about answering questions like these:
- Whatās our exposure against our critical assets?
- How fast are we responding to threats that match our threat model?
- How efficiently are we driving down real risk?
If you canāt answer that in a single metric and show how it changes over time, then itās just noise. The goal is to get from āhereās a thousand findingsā to āhereās what matters, and hereās whatās being done.ā
The Future Is Fewer Buckets, Not More People Carrying Them
The industry has done a decent job on prioritization. Most mature teams can tell you which 1 out of every 10 vulnerabilities really matters.
But even those donāt get fixed fast enough, and the volume of findings isnāt going down. Every tool is its own silo of data, and right now weāve got people walking around with buckets, collecting what they can from each system. The problem? Each person can only carry so much at a time.Ā
So now what?
We believe the future of this space isnāt just faster prioritization. At some point, weāll need to remove humans from the initial triage loop entirely. Weāre wasting talent on ticket-wrangling, copy/paste operations, and cross walking spreadsheets. That work should be owned by systems. Humans should be managing outcomes, not incidents.
This shift wonāt be easy. But itās overdue. And if we donāt start now, the gap between threat and response is only going to grow.
Letās Stop Pretending the Name Still Fits
āVulnerability managementā made sense when we had a few scanners and a manageable number of known software flaws. That world doesnāt exist anymore.
Today, exposure lives everywhere. You can find it in code, in configs, in ephemeral cloud assets, and in human error. Managing it means aggregating, enriching, and acting at scale, with context and coordination baked in. Thatās not VM. Thatās operations. Thatās risk strategy. Thatās business execution.
So maybe itās time we stop trying to fix vulnerability management and start replacing it with something that actually works.
See Nucleus in Action
Discover how unified, risk-based automation can transform your vulnerability management.