Considering the essential role of vulnerability management in maintaining IT security, examining how it can be undermined by the scale and difficulty of the task, and the ultimate acceptance of responsibility. [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]