Diagnostic Fatigue: Why the Visibility Industry Just Hit Its Limit
嗯,用户让我用中文帮他总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解它的主要内容和核心观点。 文章主要讨论了网络安全行业过去十年对“可见性”的依赖,各种工具如SIEM、EDR等都承诺通过提高可见性来增强安全性。但作者指出,现在从业者不再买账了,因为单纯的信息过载导致诊断疲劳,团队无法有效应对问题。攻击者利用漏洞的速度远快于企业修复的速度,这表明问题在于行动力而非可见性。 作者提到AI技术的发展让漏洞发现速度更快,但修复速度没跟上。因此,安全行业的未来应该转向快速修复和消除威胁,而不是仅仅关注可见性。工具需要帮助实现结果而非仅仅提供信息。 总结时要抓住这些要点:可见性的局限、诊断疲劳、行动力差距、AI的影响以及未来的方向是修复和消除威胁。控制在100字以内,并且直接描述内容。 现在组织语言:网络安全行业过去依赖可见性工具解决安全问题。但随着信息过载和诊断疲劳的出现,单纯依赖可见性已无法应对威胁。攻击者利用漏洞的速度远快于企业修复速度,凸显行动力差距。AI技术加速漏洞发现和利用,加剧了这一问题。未来安全应转向快速修复和消除威胁。 </think> 网络安全行业过去十年依赖“可见性”工具解决安全问题。但随着信息过载和诊断疲劳的出现,单纯依赖可见性已无法应对威胁。攻击者利用漏洞的速度远快于企业修复速度,凸显行动力差距。AI技术加速漏洞发现和利用,加剧了这一问题。未来安全应转向快速修复和消除威胁。 2026-4-27 16:11:50 Author: securityboulevard.com(查看原文) 阅读量:4 收藏

For more than a decade, cybersecurity has sold one product under a thousand names: visibility.

SIEM for events. EDR for endpoints. ASM for the attack surface. CNAPP for the cloud. Exposure management for everything else. Every category promised the same thing: if we could just see enough, we would finally secure enough.

The visibility industry just got a wake-up call. Practitioners are no longer buying it.

Over the last several months, I have spoken with hundreds of CISOs, security engineers, and IT leaders. Different industries, different stack sizes, different maturity levels. The sentiment is almost identical, and there is a name for it: Diagnostic Fatigue.

Teams are not drowning because they lack visibility. They are drowning because visibility, on its own, has become indistinguishable from noise. Every dashboard adds another list. Every list adds another ticket. Every ticket adds another week to the backlog. The work of finding problems has industrialized; the work of fixing them has not.

Look at the math. Attackers operationalize a new exploit in roughly 51 seconds. The average enterprise takes 27 days to fix a single exposure. That is not a visibility gap. That is an action gap, and no amount of better dashboards will close it.

And it just got worse. This month, Anthropic released Claude Mythos, an AI that surfaced more than 2,000 previously unknown software vulnerabilities in seven weeks of testing, with an 83% success rate in turning them into working exploits on the first try. Anthropic put it in defenders’ hands too, through Project Glasswing. That is the right instinct, and a clarifying moment for the industry: when vulnerability discovery runs at AI speed on both sides, every day a fix sits in a queue is a day the asymmetry compounds. More findings, faster, do not help a team that still takes 27 days to patch.

The industry’s response to the action gap has been quiet but telling: we have accepted “Assume Breach” as a strategy. Assume the attacker is already inside. Assume detection is the best you can do. Assume prevention at scale is no longer realistic.

That is not a strategy. That is a white flag dressed up in a framework.

Assume Breach was a useful mindset a decade ago, meant to keep defenders humble. Somewhere along the way, it became permission to stop trying to prevent. We outsourced our ambition and called it maturity.

It is time to flip the script.

The next era of security will not be defined by who sees the most. It will be defined by who fixes the most, fastest, without breaking the business. That requires tooling that produces outcomes, not findings: validated remediations, simulated before deployment, executed across the controls a team already owns.

We do not need another pane of glass. We need a workforce. Specifically, an AI Security Engineer that can do what humans cannot do at scale: discover an exposure, plan the fix, simulate the impact, and apply it safely, in minutes rather than weeks.

Visibility was the last decade’s product. Remediation is this decade’s mandate. The vendors who confuse the two will keep selling reports. The ones who understand the difference will give defenders something the industry has not delivered in years: an unfair advantage.

It is time to stop managing security and start eliminating threats.

Written by Barak Klinghofer, Co-Founder and CEO of Reclaim Security.

The post Diagnostic Fatigue: Why the Visibility Industry Just Hit Its Limit appeared first on CISO Whisperer.

*** This is a Security Bloggers Network syndicated blog from CISO Whisperer authored by Barak Klinghofer. Read the original post at: https://cisowhisperer.com/diagnostic-fatigue-why-the-visibility-industry-just-hit-its-limit/?utm_source=rss&utm_medium=rss&utm_campaign=diagnostic-fatigue-why-the-visibility-industry-just-hit-its-limit


文章来源: https://securityboulevard.com/2026/04/diagnostic-fatigue-why-the-visibility-industry-just-hit-its-limit/
如有侵权请联系:admin#unsafe.sh