Vulnerability

What is a vulnerability?

A vulnerability is a weakness or flaw in software, hardware, a protocol or a configuration that can be exploited by an attacker to alter the expected behaviour of a system.

Therefore, it is not the attack itself but the defect that enables it: it could be a bug in an application, a misconfiguration in a service, or an overly lax access policy.

Why does it matter for businesses?

Because vulnerabilities are the most common entry point in security incidents: from unauthorised access to data leaks or ransomware deployments. Identifying and fixing vulnerabilities reduces the attack surface and prevents technical flaws from turning into operational, regulatory or reputational losses.

How are they managed in practice?

Effective vulnerability management includes asset inventory, regular scanning, risk-based prioritisation (impact + likelihood), patching, configuration hardening and testing (pentesting). It is complemented by Cyber Threat Intelligence (CTI) to understand active exploits, and by operational controls (IAM/PAM, segmentation, Zero Trust, SIEM / XDR / SOAR) that limit the impact if a vulnerability is exploited.

An unpatched vulnerability is a direct opportunity for an attacker; managing it is managing business risk.