Security

Why 87% of Organizations Are Running Exploitable Vulnerabilities | Andrew Krug, Datadog | TFiR

0

Security teams today face a paradox: the faster they ship code, the more vulnerabilities accumulate. The slower they move to be cautious, the more outdated libraries pile up with critical CVEs. It’s not a patching problem—it’s a prioritization crisis. When 87% of organizations are running software with known exploitable vulnerabilities, the bottleneck isn’t remediation speed. It’s the inability to distinguish signal from noise in a flood of alerts where only 18% of critical findings remain critical once runtime context is applied.

In a DevSecOps environment optimized for velocity, security tooling hasn’t kept pace. Teams are drowning in findings with no clear path to action. The result? Analysis paralysis, burnout, and real exploits slipping through unaddressed.

The Guest: Andrew Krug, Head of Security Advocacy at Datadog

Key Takeaways

  • Runtime context reduces critical vulnerabilities by 82%—focusing teams on code reachability and public exposure
  • End-of-life language versions face exploitable vulnerabilities in 50% of cases versus 31% for supported versions
  • 50% of organizations adopt new library versions within 24 hours of release, raising questions about hash pinning practices
  • GitHub Actions dependencies should be pinned to full-length hashes to prevent supply chain compromise in CI/CD
  • AI agents are accelerating triage and remediation workflows from months to days

***

Read Full Transcript & Technical Deep Dive

Project Glasswing Aims to Turn AI From Threat to Shield for Open Source Security

Previous article

MITRE ATLAS and ATT&CK Navigator: How CISOs Are Securing AI Systems Against Real Threat Groups | Steve Winterfeld, Akamai | TFiR

Next article