Using AI Agents to Separate Real Risk From Vulnerability Noise
None
<div style="padding: 56.25% 0 0 0; position: relative;"><iframe style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" title="AI Agents That Eliminate 90% of Security Vulnerabilities?" src="https://player.vimeo.com/video/1157594771?badge=0&autopause=0&player_id=0&app_id=58479" frameborder="0"></iframe></div><p><script src="https://player.vimeo.com/api/player.js"></script></p><p data-start="195" data-end="664">Snir Ben Shimol, CEO and co-founder of Zest Security, talks about why vulnerability and exposure management has become one of the most stubborn problems in security operations. Ben Shimol argues that the numbers are getting worse, not better. Exploitation has become the top initial access path, new CVEs keep piling up and teams are still drowning in triage and remediation work that remains largely manual.</p><p data-start="666" data-end="1388">Zest’s answer is what it calls AI Sweeper Agents. The concept is straightforward: instead of handing security teams an even larger list of findings, use AI agents to determine which vulnerabilities in a specific environment are actually reachable and exploitable. Ben Shimol describes the agents as mimicking the work of a senior security engineer at scale. They ingest vulnerability details, identify the real requirements for exploitation and compare those requirements to evidence in the customer’s environment, such as network placement, permissions and configuration. If key conditions are missing, the vulnerability is swept out of the backlog. If the conditions are met, it stays for prioritization and remediation.</p><p data-start="1390" data-end="1747">Ben Shimol says this approach can eliminate the bulk of findings that teams feel compelled to chase, claiming Zest has swept more than 11 million vulnerabilities across customers. The result, he says, is waking up to a backlog that is dramatically smaller, leaving teams able to focus on the issues that actually matter rather than spending cycles on noise.</p><p data-start="1749" data-end="2089">The conversation also touches on a familiar friction point: audits and compliance. Ben Shimol notes that highly regulated customers initially faced pushback when large portions of a backlog disappeared, but argues that the agents provide evidence-based reasoning that auditors can review, turning subjective arguments into documented facts.</p><p data-start="2091" data-end="2288" data-is-last-node="" data-is-only-node="">For security leaders buried under vulnerability volume, this is a look at how agentic AI is being positioned to reduce manual triage and help teams focus remediation where it reduces risk.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/02/using-ai-agents-to-separate-real-risk-from-vulnerability-noise/" data-a2a-title="Using AI Agents to Separate Real Risk From Vulnerability Noise"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fusing-ai-agents-to-separate-real-risk-from-vulnerability-noise%2F&linkname=Using%20AI%20Agents%20to%20Separate%20Real%20Risk%20From%20Vulnerability%20Noise" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fusing-ai-agents-to-separate-real-risk-from-vulnerability-noise%2F&linkname=Using%20AI%20Agents%20to%20Separate%20Real%20Risk%20From%20Vulnerability%20Noise" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fusing-ai-agents-to-separate-real-risk-from-vulnerability-noise%2F&linkname=Using%20AI%20Agents%20to%20Separate%20Real%20Risk%20From%20Vulnerability%20Noise" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fusing-ai-agents-to-separate-real-risk-from-vulnerability-noise%2F&linkname=Using%20AI%20Agents%20to%20Separate%20Real%20Risk%20From%20Vulnerability%20Noise" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fusing-ai-agents-to-separate-real-risk-from-vulnerability-noise%2F&linkname=Using%20AI%20Agents%20to%20Separate%20Real%20Risk%20From%20Vulnerability%20Noise" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>