To determine the significance of threats and vulnerabilities, you have to gain context for them as they relate to your organization and other networked elements across the Internet.
To do this, you should review both positive and negative data to understand the severity of the issue. You can research specific topology, threat, and historical details for each networked asset by accessing the Element Details.
Once you have discovered the relationships between threat intelligence data and associated network assets, you can better determine whether that specific threat data is actionable and then take steps to reduce the threat to your environment.
scoutPRIME provides a TIC Score for:
Elements
Collections
Threats
Vulnerabilities
Related Content