At any given time, the typical enterprise faces more than
400 open security vulnerabilities – meaning risks that threat actors could exploit to take control of applications or host environments. With so many risks to manage, most organizations can't realistically address every vulnerability immediately. Instead, they need to focus on the ones that pose the greatest risk and close them first, then move onto mitigating other vulnerabilities if they have time.