Analysis of one billion CISA KEV remediation records exposes limits of human-scale security

Analysis of one billion CISA KEV remediation records exposes limits of human-scale security
Qualys research shows attackers weaponize critical vulnerabilities faster than organizations can patch them, with Time-to-Exploit at negative seven days and a rising percentage of critical flaws still open at Day 7. Defenders must move from manual scan-and-report models to autonomous, closed-loop Risk Operations Centers that measure Risk Mass and AWE and automate remediation to remove human latency. #Spring4Shell #CiscoIOSXE #Follina

Keypoints

  • Time-to-Exploit has collapsed to negative seven days, meaning many vulnerabilities are weaponized before patches exist.
  • Organizations are closing far more tickets but Day-7 exposure of critical vulnerabilities rose from 56% to 63%, showing staffing alone can’t fix the problem.
  • Of 52 tracked weaponized vulnerabilities, 88% were remediated slower than exploited, with Spring4Shell and Cisco IOS XE requiring hundreds of days on average.
  • Risk Mass and Average Window of Exposure (AWE) are better metrics than CVE counts because cumulative exposure and long-tail patching drive most breach risk.
  • Security teams must adopt autonomous Risk Operations Centers with machine-readable policies, active exploit confirmation, and automated remediation to eliminate human latency.

Read More: https://www.bleepingcomputer.com/news/security/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security/