WEBINAR

John Hammond + Panther: How agentic workflows are redefining the SOC. Save your seat →

close

John Hammond + Panther: How agentic workflows are redefining the SOC. Save your seat →

close

BLOG

What Is Threat and Vulnerability Management? A 2026 Guide

Threat and vulnerability management (TVM) is a continuous discipline for detecting, analyzing, prioritizing, and responding to cybersecurity threats and vulnerabilities based on organizational risk. In CISA's C2M2, it's a distinct domain covering vulnerability reduction, threat response, information sharing, and management activities.

The key word is "continuous" — TVM isn't a quarterly scan or an annual audit. It's an ongoing loop of discovery, prioritization, and remediation that adapts as your environment and the threat landscape change.

The problem isn't that teams lack frameworks. It's that most TVM programs generate findings faster than anyone can act on them, and without threat context, there's no reliable way to decide what to fix first.

This guide covers how TVM's core components fit together in 2026 and how to build a program that reduces risk on a lean team, starting with the vulnerabilities that matter most.

Key Takeaways:

  • TVM combines threat intelligence and vulnerability management into one discipline because a vulnerability list without threat context provides no basis for prioritization, and threat intelligence without vulnerability context can't map to your environment.

  • Risk-based prioritization is the most impactful lever for lean teams. A very small subset of 2025-disclosed vulnerabilities were simultaneously remotely exploitable and actively weaponized. Layering CVSS, EPSS, CISA KEV, and SSVC sharply narrows the urgent prioritization workload.

  • Cloud-native environments change core TVM assumptions. Ephemeral containers, infrastructure-as-code, and multi-cloud deployments require agentless discovery, shift-left scanning in CI/CD pipelines, and behavioral detection.

  • detection-as-code and AI-assisted triage are becoming more prominent in TVM operations, but AI tools still score lowest in SOC satisfaction surveys. Apply AI to narrow problems like alert prioritization and false positive reduction, and keep humans in the loop.

Why TVM Treats Threats and Vulnerabilities as One Problem

A threat describes who might attack you and how: any circumstance or event with the potential to adversely impact your organization through unauthorized access, destruction, disclosure, or denial of service.

A vulnerability describes where you're exposed: a weakness that an actor can exploit or accidentally trigger to access, modify, or disrupt the normal operations of a system.

TVM combines both because risk depends on both. Risk determination is the process of identifying threats, vulnerabilities, the harm that may occur given the potential for threats exploiting vulnerabilities, and the likelihood that such harm will occur.

A vulnerability database without threat context produces a list with no basis for prioritization. Threat intelligence without vulnerability context identifies actor capabilities but can't map them to exploitable conditions in your environment. Run them as separate programs and neither can answer the obvious question: given what attackers are actually doing right now, which of our weaknesses should we fix first?

Core Components of a TVM Program

A TVM program works as a connected system rather than isolated tasks. The components below show how discovery, scanning, intelligence, prioritization, remediation, and monitoring reinforce one another, and why gaps in one area weaken the rest.

1. Asset Discovery and Inventory

Asset inventory is the starting point for every other TVM activity. CIS Control 1, Inventory and Control of Enterprise Assets, is the prerequisite for all subsequent vulnerability management, and for cloud-native teams this means capturing cloud accounts, containers, serverless functions, and ephemeral workloads.

NIST finalized SP 800-228 in June 2025, updated in March 2026 with additional guidance on API protection for cloud-native systems.

2. Vulnerability Scanning and Assessment

Scanning in cloud-native environments requires coverage across container image scanning in CI/CD pipelines, infrastructure-as-code scanning before provisioning, and runtime vulnerability detection that evaluates context like privilege level, network exposure, and actual exploitability. CISA TIC 3.0 provides security guidance for cloud environments, including security capabilities and telemetry requirements.

3. Threat Intelligence Integration

Threat intelligence becomes useful when enriched with organizational context, threat information that has been aggregated, transformed, analyzed, interpreted, or enriched to help provide the necessary context for decision-making. The CISA KEV is an authoritative feed for confirmed in-the-wild exploitation intelligence.

4. Risk-Based Prioritization

CVSS Base scores alone are insufficient because they reflect intrinsic severity, not exploitation likelihood. SSVC generates stakeholder-specific action decisions such as Track, Track*, Attend, or Act based on exploitation status and impact-related factors, and CISA has adopted a customized version for its own vulnerability management decisions with a publicly accessible calculator.

5. Remediation and Patch Management

Remediation execution is where most TVM programs struggle. The gap between findings generation and coordinated cross-team remediation is the breakdown point. In cloud-native environments, remediation frequently means rebuilding and redeploying container images instead of patching running hosts.

CISA's Zero Trust Maturity Model v2.0 identifies criteria for moving towards immutable workloads and related DevSecOps best practices.

Continuous Monitoring and Detection

Continuous monitoring addresses the detection of anomalies, indicators of compromise, and other potentially adverse events. detection-as-code is the emerging model, enabling automated updates to detection rules and continuous testing of detection logic.

The TVM Lifecycle: From Discovery to Remediation

The TVM lifecycle works best as a recurring loop. Each pass gives you updated information about exposure, priority, and response.

  1. Identify: Discover assets and scan for vulnerabilities across all layers.

  2. Analyze: Assess each vulnerability in context using CVSS severity, EPSS exploitation probability, and asset exposure.

  3. Prioritize: Apply the layered framework: CVSS + EPSS + CISA KEV + SSVC. Of all disclosed vulnerabilities, only a much smaller subset were remotely exploitable, actively weaponized, and supported by working proof-of-concept code.

  4. Remediate: Patch, rebuild, or apply compensating controls. For KEV-listed vulnerabilities, BOD 22-01 establishes mandatory remediation timelines.

  5. Verify: Confirm remediation through automated testing in CI/CD pipelines.

  6. Report: Track MTTD, MTTR, and KEV coverage rate. Federal guidance defines MTTR for KEV vulnerabilities as the time between either first detection or KEV catalog addition and remediation.

What's Changed in 2026: AI, Detection-as-Code, and Cloud-Native TVM

TVM operations in 2026 are changing most in triage, detection engineering, and cloud infrastructure handling. The shifts show up most clearly in how teams triage alerts, how they ship detection rules, and how they handle short-lived infrastructure.

How AI-Powered Triage Reshapes Threat Management

AI-assisted triage helps teams handle the gap between fast exploitation windows and much slower detection cycles. Organizations using AI-powered defenses reduced breach costs by an average of about $1.9–$2.45 million.

The limitations matter as much as the upside. 40% of SOCs use AI/ML tools without making them a defined part of operations, and AI/ML tools rank last in SOC technology satisfaction.

For lean teams, the move is to apply AI to specific, well-bounded problems like alert prioritization, false positive reduction, and context compilation, where you can verify its reasoning and keep humans in the decision loop.

As Matt Muller, Field CISO at Tines, explains, "AI assisted humans are going to be the ones who are most successful. AI with guard rails is going to be, I think, the path forward for the foreseeable future." Cresta's security team demonstrated this by adopting Panther AI for alert triage and cutting triage time by 50%, with full transparency into how conclusions were reached.

Detection-as-Code as a TVM Accelerator

Detection-as-code treats detection rules as first-class code artifacts: written, tested, versioned, and deployed through the same CI/CD workflows your engineering team uses for application code. The approach has gained enough traction that SANS now covers detection-as-code pipelines in its SEC598 course alongside AI-driven automation.

Instead of leaving threat intelligence in analyst notebooks, detection-as-code converts it into deployed, tested rules. In Panther, you write detection rules in Python, SQL, or YAML with unit tests included, managed through Git-based CI/CD pipelines. The SigmaHQ rules repository hosts more than 3,000 detection rules available as an open-source baseline.

The operational risk of skipping validation is clear: deploying rules without version control and testing creates a significant risk of false positives and analyst burnout.

Cloud-Native Environments Demand a Different Approach

Traditional vulnerability management assumed persistent, scannable infrastructure. Cloud-native infrastructure violates that assumption. Containers can cycle out before traditional scan cycles complete, and a single vulnerable image can replicate across thousands of pods before detection.

Kubernetes introduces its own attack surface. CVE-2025-1974 (IngressNightmare) presented a serious risk to many Kubernetes users, and CVE-2025-31133 (runc escape) allowed attackers to gain host execution and bypass container isolation.

Common TVM Challenges and How to Solve Them

Alert Fatigue and Prioritization Overload

Organizations process an average of 960 daily alerts from approximately 28 different security tools. Ninety-one percent report remediation delays.

Context-based prioritization cuts through the volume. The Docker team demonstrated this in practice, reducing false positives by 85% while 3Xing ingestion.

Scaling TVM Across Cloud and Hybrid Infrastructure

Forty percent of breaches involved data stored across multiple environments, costing over $5 million on average and taking 283 days to identify and contain.

Panther addresses this with a Security Data Lake built on Snowflake. 60+ native connectors pull logs from cloud, SaaS, and endpoint sources into one searchable store, giving you cross-cloud visibility without stitching together separate logging pipelines.

Closing the Gap Between Detection and Remediation

The average MTTR for high and critical application/API vulnerabilities is 74.3 days. Vulnerabilities with EPSS scores above 70% average 109.4 days to remediate.

Closing this gap requires connecting detection directly to remediation workflows: automated ticketing, defined SLAs by severity tier, and metrics that create accountability.

Building a TVM Program That Actually Reduces Risk

1. Start with Critical Assets, Not Total Coverage

Effective risk prioritization accounts for the likelihood that a threat source will act, that a vulnerability exists, and that an asset will experience an undesirable effect impacting objectives.

Build your asset inventory first (CIS Control 1), then subscribe to the CISA KEV. Treat KEV-listed vulnerabilities present in your environment as a top-priority remediation queue.

2. Connect TVM to Your Detection and Response Workflow

TVM only reduces risk when findings connect directly to detection and response. When a CVE hits the KEV catalog, your tooling should compare it against your asset inventory, flag affected systems, and trigger your remediation workflow.

In Panther, detection rules can incorporate threat intelligence feeds, and the AI SOC analyst triages resulting alerts, pulling enrichments, reading detection logic, and surfacing relevant context. The AI SOC analyst still needs human judgment for decisions requiring organizational context, but it handles the repetitive compilation work that consumes most of an analyst's day.

3. Measure What Matters: MTTD, MTTR, and Risk Reduction

Track three metrics weekly:

  1. MTTR for KEV vulnerabilities

  2. KEV coverage rate

  3. Critical asset patch coverage.

Monthly, add MTTD and SLA compliance rate by severity tier. Quarterly, report the directional risk trend to leadership. For context: the current average MTTR is 74.3 days, while industry SLA frameworks typically target 24 to 72 hours for critical vulnerabilities.

TVM Is the Foundation, Not the Finish Line

The gap between exploitation speed and response time isn't going to close itself. But a TVM program built around critical assets, automated detection-to-remediation loops, and a small set of tracked metrics gives your team a realistic path to narrowing it, one cycle at a time.

Panther gives lean security teams the detection-as-code workflows, AI-assisted triage, and unified data lake they need to connect TVM findings to real-time detection and response. Request a demo to see how it works with your stack.

Share:

Bolt-on AI closes alerts. Panther closes the loop.

See how Panther compounds intelligence across the SOC.

Bolt-on AI closes alerts. Panther closes the loop.

See how Panther compounds intelligence across the SOC.

Bolt-on AI closes alerts. Panther closes the loop.

See how Panther compounds intelligence across the SOC.

Bolt-on AI closes alerts. Panther closes the loop.

See how Panther compounds intelligence across the SOC.

Get product updates, webinars, and news

By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.

Get product updates, webinars, and news

By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.

Get product updates, webinars, and news

By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.