{"id":232,"date":"2026-03-11T15:11:01","date_gmt":"2026-03-11T15:11:01","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=232"},"modified":"2026-03-11T15:11:01","modified_gmt":"2026-03-11T15:11:01","slug":"what-boards-must-demand-in-the-age-of-ai-automated-exploitation","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=232","title":{"rendered":"What Boards Must Demand in the Age of AI-Automated Exploitation"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjsE7iXMy1HxdiC1nv__LhHF82XPreFShxc1GUsFkX9zgXiLwfkFKnVKzKOIYxe3D8_-dQeigLmUpbojS2-9doGrKHcwXhV34J1S1qsK8TzWyo3kymXEHMtML-js6yobbKDk3DXCi7bV2tXjKs_p5KtbvHoyPXEANC0LI5h5fBqIw2poe_O2x-sh4tO4T4\/s1700-e365\/ai-exploit.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>\u201cYou knew, and you could have acted. Why didn\u2019t you?\u201d\u00a0<\/p>\n<p>This is the question you do not want to be asked. And increasingly, it\u2019s the question leaders are forced to answer after an incident.<\/p>\n<p>For years, many executive teams and boards have treated a large vulnerability backlog as an uncomfortable but tolerable fact of life: \u201cwe\u2019ve accepted the risk.\u201d If you\u2019ve ever seen a report showing thousands (or tens of thousands) of open Highs and Critical CVEs, you\u2019ve probably also heard the usual rationalizations from folks that would rather look the other way: <em>we have other priorities<\/em>, <em>this will take years of engineering time to fix<\/em>, <em>how do you know these are really Critical, we\u2019re still prioritizing, we\u2019ll get to it.<\/em><\/p>\n<p>In the old world, that story, while not good, was often survivable. Exploitation was slower, more manual, and required more operator skill. Even the most sophisticated attackers had constraints. Organizations leaned on those constraints as an unspoken part of the risk model: \u201cIf it was really as bad as you say, we\u2019d be compromised right now.\u201d<\/p>\n<p>That world is gone.<\/p>\n<h2><strong>AI has collapsed the cost of exploitation<\/strong><\/h2>\n<p>We\u2019re now watching threat actors use agentic AI systems to accelerate the entire offensive workflow: reconnaissance, vulnerability discovery, exploit development, and operational tempo. Anthropic <a href=\"https:\/\/www.anthropic.com\/news\/disrupting-AI-espionage\" rel=\"noopener\" target=\"_blank\">publicly detailed<\/a> disrupting a cyber-espionage campaign in which attackers used Claude in ways that materially increased their speed and scale, and they explicitly warned that this kind of capability can allow less experienced groups to do work that previously required far more skill and staffing.\u00a0<\/p>\n<p>As security leaders, we know that AI enables attackers to move faster. But now, automation turns a backlog into a weapon. In the old model, having 13,000 Highs in production could be rationalized as a triage problem. In the new model, attackers can move from chain discovery to validation and exploitation in dramatically less time. \u201cWe\u2019re working the backlog\u201d stops sounding like a strategy and starts sounding like an excuse.<\/p>\n<p><a name=\"more\"\/><\/p>\n<h2><strong>The most dangerous sentence in the boardroom<\/strong><\/h2>\n<p>\u201cDon\u2019t worry, the CISO has it handled.\u201d<\/p>\n<p>I\u2019ve lived the reality behind that sentence. CISOs can build programs, establish priorities, report metrics, and drive cross-functional remediation, but in many enterprises, the vulnerability problem is structurally bigger than any one executive\u2019s responsibility. It\u2019s a system problem: legacy dependencies, release velocity constraints, fragile production environments, and limited engineering resources. Boards can\u2019t delegate governance.<\/p>\n<p><a href=\"https:\/\/www.ethics.harvard.edu\/blog\/post-6-caremark-rule-and-board-level-ai-risk-management%C2%A0\" rel=\"noopener\" target=\"_blank\">Delaware\u2019s Caremark line of cases<\/a> is frequently cited in director oversight discussions: boards must have reporting systems designed to surface consequential risk and must actually engage with what those systems report. The point isn\u2019t to scare directors with legal theory \u2013 it\u2019s to make the practical governance point that if your reporting says \u201cwe have thousands of serious vulnerabilities open,\u201d the board\u2019s job is to exercise oversight.<\/p>\n<h2><strong>What boards should demand (and how CISOs should answer)<\/strong><\/h2>\n<p>If you\u2019re a board member, you should seek operational truth. Focus on the resiliency of your company\u2019s tech, not just compliance. And if you\u2019re a security leader, you should be creating the operating systems that provide it. These are the questions teams can use that cut through performative cybersecurity:<\/p>\n<ol>\n<li><strong>What does our vulnerability management program look like end-to-end?<\/strong><\/li>\n<li><strong>How many vulnerabilities (especially Criticals and Highs) exist in our products right now?<\/strong><\/li>\n<li><strong>How long did it take to fully remediate new Criticals and Highs in the past quarter? The past year?<\/strong><\/li>\n<li><strong>If a new 0-day was discovered in our top-selling product today, how long would it take before we could tell customers it was safe?<\/strong><\/li>\n<li><strong>What is the dollar cost of our current vulnerability backlog? <\/strong>(Multiply people-hours to fix by fully loaded engineering cost, and you get a number the board can govern.)<\/li>\n<\/ol>\n<p>This is how you make the backlog tangible enough that leadership stops hiding behind abstractions.<\/p>\n<h2><strong>\u201cPatch faster\u201d is not a complete answer<\/strong><\/h2>\n<p>Many organizations respond to board pressure by promising to patch faster. That helps, until it breaks production.<\/p>\n<p>If emergency patching reliably causes customer impact (and in some environments it does), you\u2019re forced into a terrible tradeoff: accept exposure or accept downtime. The modern enterprise needs a model that reduces the frequency and blast radius of emergency remediation, not one that merely accelerates the same fragile process.<\/p>\n<h2><strong>The supply chain reality: liabilities are shifting<\/strong><\/h2>\n<p>We\u2019re seeing liabilities shift as regulators and courts focus on software supply chain hygiene and operational resilience.\u00a0<\/p>\n<p>In the EU, the Cyber Resilience Act (CRA) is now in force, with its main obligations taking effect in December 2027. Many organizations will face stronger expectations for vulnerability handling, secure-by-design practices, and accountability throughout the software lifecycle.<\/p>\n<p>In financial services, DORA (Digital Operational Resilience Act) has entered into application, bringing harmonized ICT risk management and operational resilience requirements across the EU.\u00a0<\/p>\n<p>We\u2019re also seeing this dynamic play out in the US, where negligence claims are brought in class action lawsuits against firms, with plaintiffs alleging a lack of due care that led to data breaches.<\/p>\n<h2><strong>You can reduce the backlog by design<\/strong><\/h2>\n<p>In the age of AI-accelerated exploitation, \u201cmanaged risk\u201d too often means assuming attackers will keep moving at yesterday\u2019s pace.<\/p>\n<p>Boards should stop accepting that assumption. CISOs should stop pretending \u201cpatch faster\u201d or getting a risk acceptance is sufficient. And organizations should invest in reducing vulnerability exposure at the source so the next audit report isn\u2019t a spreadsheet of accepted risks, but evidence of a shrinking attack surface.<\/p>\n<p>Shameless plug, this is where Chainguard\u2019s approach is designed to change the math: start with secure-by-default software components that minimize vulnerabilities from the outset and reduce vulnerability accrual over time. That means fewer critical findings landing in your environment, fewer emergency patch cycles, and less operational disruption when the next high-profile CVE hits.<\/p>\n<p>By structurally reducing vulnerability backlog and remediation toil, teams can redirect engineering time from zero-ROI firefighting into high-ROI innovation that actually drives competitive advantage and revenue.<\/p>\n<p>Because when the finger-pointing starts after the breach, and someone asks why the company chose to live with 13,000 Highs in production, the only defensible answer is: we didn\u2019t. We changed the system.<\/p>\n<p><em>For more hot takes and practical advice from \u2013 and for \u2013 engineering and security leaders, subscribe to <a href=\"https:\/\/www.linkedin.com\/build-relation\/newsletter-follow?entityUrn=7044340686887796736\" rel=\"noopener\" target=\"_blank\">Unchained<\/a> or <a href=\"https:\/\/www.chainguard.dev\/contact\" rel=\"noopener\" target=\"_blank\">reach out<\/a> to learn more about Chainguard.\u00a0<\/em><\/p>\n<p><strong>Note: <\/strong>This article was expertly written and contributed by<em>Quincy Castro, CISO, Chainguard.<\/em><\/p>\n<div class=\"cf note-b\">Found this article interesting? <span class=\"\">This article is a contributed piece from one of our valued partners.<\/span> Follow us on <a href=\"https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ\" rel=\"noopener\" target=\"_blank\">Google News<\/a>, <a href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to read more exclusive content we post.<\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cYou knew, and you could have acted. Why didn\u2019t you?\u201d\u00a0 This is the question you do not want to be asked. And increasingly, it\u2019s the question leaders are forced to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":233,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[600,601,598,599,65],"class_list":["post-232","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-age","tag-aiautomated","tag-boards","tag-demand","tag-exploitation"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=232"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/232\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/233"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}