Security Experts:

Connect with us

Hi, what are you looking for?


Management & Strategy

Tenable Adds ‘Predictive Prioritization’ to Vulnerability Management Offering

Tenable on Monday announced the general availability of a new service designed to help organizations identify the vulnerabilities that have the highest likelihood of being exploited.

Tenable on Monday announced the general availability of a new service designed to help organizations identify the vulnerabilities that have the highest likelihood of being exploited.

Predictive Prioritization is currently available for Tenable customers using the on-premises vulnerability management solution, but it will be added to, the cloud-based version, later this year.

The cybersecurity firm has pointed out that of the more than 16,000 new vulnerabilities disclosed in 2018, only 7 percent had an exploit available and Tenable estimates that only 3 percent will actually be exploited.

Many experts agree that prioritizing patching based on CVSS scores can be highly ineffective – the method creates a vulnerability overload and places a lot of pressure on security teams.

Tenable’s new Predictive Prioritization service aims to address this by helping organizations identify those 3 percent of security holes that are actually likely to be exploited in attacks.

Using data from over 150 sources, Predictive Prioritization helps calculate a vulnerability priority rating (VPR) for each vulnerability. Unlike the CVSS score, which is static, the VPR is updated daily based on the latest threat information and it helps predict if a flaw will be exploited in the next 28 days.

“Predictive Prioritization is a massive innovation in vulnerability management. It will change the way companies run their vulnerability management programs by giving them a new level of insight on where to focus based on threats to the business,” said Renaud Deraison, co-founder and CTO of Tenable. “Predictive Prioritization is unprecedented in the vulnerability management market and will help organizations answer foundational questions about where they’re exposed and what vulnerabilities to prioritize for remediation based on the threat landscape — two questions that are critical for achieving Cyber Exposure.”

Related: For Effective Patch Management, Don’t Overlook Risk

Related: Tenable Soars on IPO Day

Related: Tenable, Cylance Disclose Revenue Metrics

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.


Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.