Step 3: Determining risks and prioritizing vulnerabilities Learn how to determine risks and prioritize vulnerabilities identified in an application.