Methodology

Modern AI enables us to model security posture, asset value, and attacker behavior with real precision—but only if we adapt to the enterprise’s actual environment. Local models let us reflect your infrastructure, your priorities, and your risk—not someone else’s.

Our models are trained on over 16,000 known exploited CVEs

Compare Effort: CVSS, EPSS, Empirical Local

Empirical Models outperform CVSS as the way to prioritize vulns. When comparing performance measures (such as effort or coverage) it’s undeniable.

Published CVEs

Prioritized CVEs

Exploited CVEs

CVSS 9+ (Critical)

Threshold: 0.9

Effort: 14.4%

Coverage: 40.4%

Efficiency: 9.5%

EPSS V4 (Same Effort)

Better Coverage & Efficiency

Threshold: 0.029

Effort: 14.4%

Coverage: 87.6%

Efficiency: 20.6%

Empirical Local (Same Effort)

Better Coverage & Efficiency

Threshold: 0.028

Effort: 14.4%

Coverage: 95.4%

Efficiency: 22.4%

Local model results may vary depending on your security dataset.

Compare Coverage: CVSS, EPSS, Empirical Local

Empirical Models reduce the required effort to achieve the same coverage compared to CVSS. Empirical Global models are 6x more efficient.

Published CVEs

Prioritized CVEs

Exploited CVEs

CVSS 7+ (High to Critical)

Threshold: 0.7

Effort: 50.5%

Coverage: 76.8%

Efficiency: 5.1%

EPSS V4 (Same Coverage)

Less Effort, More Efficiency

Threshold: 0.098

Effort: 7.4%

Coverage: 76.8%

Efficiency: 34.8%

Empirical Local (Same Coverage)

Less Effort, More Efficiency

Threshold: 0.968

Effort: 2.6%

Coverage: 76.9%

Efficiency: 99.3%

Local model results may vary depending on your security dataset.

FAQ

What is EPSS?

While other industry standards have been useful for capturing innate characteristics of a vulnerability and provide measures of severity, they are limited in their ability to assess threat. EPSS fills that gap because it uses current threat information from CVE and real-world exploit data. The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

How do we define Efficiency?

Efficiency considers how efficiently resources were spent by measuring the percent of prioritized vulnerabilities that were exploited. Prioritizing mostly exploited vulnerabilities would be a high efficiency rating (resources were allocated efficiently), while prioritizing perhaps random or mostly non-exploited vulnerabilities would result in a low efficiency rating. Efficiency is calculated as the number of exploited vulnerabilities prioritized (True Positives, Correctly Identified) divided by the total number of prioritized vulnerabilities (True Positives + False Positives).

How do we define Coverage?

Coverage considers how well is the percent of exploited vulnerabilities that were prioritized, and is calculated as the number of exploited vulnerabilities prioritized (True Positives, Correctly Identified) divided by the total number of exploited vulnerabilities (True Positives + False Positives). Having low coverage indicates that not many of the exploited vulnerabilities were remediated with the given strategy.

Compare Model Threshold Performance

Empirical Models combine real-time internet exploitation telemetry with EPSS predictions to provide the most accurate view of exploitation. Empirical monitors activity on over 16,000 exploited CVEs—10 times more than the next best model—and offers hourly exploitation evidence and volume, an industry first. Compare to DHS CISA KEV: ~1200

CVSS

EPSS

Empirical Global

We bring measurable impact

Past solutions can’t prioritize, assess, and handle effective inference at scale. With Empirical, our models provide understanding and superior prioritization.

6x

More efficient than CVSS (comparison vs. EPSS, our free model, at 87% coverage)

12.4x

A 1249.04% increase in total exploited CVEs as of January 9th, 2025 compared to CISA Known Exploited Vulnerabilities (KEV)

23x

4925 newly exploited CVEs in the last 12 months, compared to 204 in CISA KEV

See how your model would differ

Try our models with your own local data and discover their impact on your cybersecurity environment.

Request Demo