Imagine two security analysts engaging in conversation about the intricacies of their work when one receives hundreds of vulnerability alerts; all scored high risk at seven or eight. Throwing his hands up in frustration, he asks his co-worker, “What are we supposed to do with all this? Where do we start?” After a glance, the second analyst replies, “Well, there’s zero context from the vulnerability scanner. So, looks like no lunch break for us today, buddy … or tomorrow.”