The traditional approach to handling vulnerabilities is no longer effective, as risk-based vulnerability management tools still yield overwhelming, unprioritized lists, and many vulnerabilities don't even pose a threat in the context of YOUR environment.