Evolving OVAL

Security vulnerabilities aren't static, and neither is the way we consume vulnerability inform. So how is Red Hat keeping pace with vulnerability data trends?