Is your organization able to rank vulnerabilities based on exploitability and potential impact? If so, how automated is the process?
Yes, we have fully automated the process
Yes, but we are using a combination of automation and manual processes
Yes, but we are only using manual processes
See this poll on:
Created at Crowdsignal.com