The evolution of vulnerability management