Skip to content
Tech News
← Back to articles

Analysis of one billion CISA KEV remediation records exposes limits of human-scale security

read original get Cybersecurity Incident Response Kit → more articles
Why This Matters

This analysis highlights the urgent need for a fundamental shift in cybersecurity strategies, as traditional patching and staffing efforts are insufficient against rapidly weaponized vulnerabilities and AI-driven threats. The data underscores that the current operational models are broken, emphasizing the importance of autonomous, closed-loop risk management systems to better protect organizations and consumers. As threat timelines shrink and attack sophistication grows, adapting to these new realities is critical for maintaining security in the digital age.

Key Takeaways

Author: Saeed Abbasi, Senior Manager, Threat Research Unit, Qualys

With Time-to-Exploit now at negative seven days and autonomous AI agents accelerating threats, the data no longer supports incremental improvement. The architecture of defense must change.

What Leaders Need to Know

Analysis of CISA's Known Exploited Vulnerabilities over the past four years shows critical vulnerabilities still open at Day 7 worsened from 56% to 63% despite teams closing 6.5x more tickets. Staffing cannot solve this.

Of the 52 tracked weaponized vulnerabilities in our study, 88% were patched more slowly than they were exploited — half were weaponized before any patch existed.

The problem is not speed. It is the operational model itself.

Cumulative exposure, not CVE counts, is the true risk metric that security teams now need to measure. While dashboards reward the sprint to get patches implemented, breaches exploit the tail. AI is not another attack surface — instead, the transition period where AI-powered attackers face human defenders is the industry's most dangerous window.

In response, defenders have to implement their own autonomous, closed-loop risk operations.

The Broken Physics

New research from the Qualys Threat Research Unit, analyzing more than one billion CISA KEV remediation records from across 10,000 organizations over four years, quantifies what the industry has long suspected but never proved at scale. The operational model underpinning enterprise security is broken.

... continue reading