News

Vulnerability Management’s New Mandate: Remediate What’s Real

  • Alan Shimel--securityboulevard.com
  • published date: 2025-12-19 00:00:00 UTC

None

<div style="padding: 56.25% 0 0 0; position: relative;"><iframe style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" title="Snir Ben Shimol on Modern Vulnerability Management and AI-Driven Security with ZEST Security | AWS re:Invent 2025" src="https://player.vimeo.com/video/1143152239?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479" frameborder="0"></iframe></div><p><script src="https://player.vimeo.com/api/player.js"></script></p><p data-start="752" data-end="1226">Live from AWS re:Invent, Snir Ben Shimol makes the case that vulnerability management is at an inflection point: visibility is no longer the differentiator—remediation is. Organizations have spent two decades getting better at scanning, aggregating and reporting findings. But the uncomfortable truth is that many of today’s incidents still trace back to vulnerabilities that were already known internally, while the time between disclosure and exploitation keeps shrinking.</p><p data-start="1228" data-end="1672">That reality is pushing vulnerability management out of its “infinite backlog” era and into an SLA era. It’s not enough to show auditors you can produce a list. Regulators, cyber insurers and enterprise customers increasingly expect commitments around how quickly critical issues are fixed, especially for teams selling SaaS into regulated industries. Continuous scanning is now table stakes; proof of operational follow-through is the new bar.</p><p data-start="1674" data-end="2134">A core theme is that raw severity scores don’t map cleanly to real-world risk. What matters is exploitability and reachability in <em data-start="1824" data-end="1830">your</em> environment—whether compensating controls, segmentation, encryption policies or service configurations effectively neutralize a theoretical issue. Security teams often know this intuitively, but validating it at scale has historically required time-consuming manual analysis and cross-team coordination.</p><p data-start="2136" data-end="2587">Ben Shimol also surfaces the human cost: vulnerability teams spend their days chasing tickets, fighting backlog gravity, and struggling to define what “winning” looks like beyond “we didn’t get breached today.” The promise of AI in this context isn’t magic automation; it’s reduction of toil—helping teams focus on the smaller set of vulnerabilities that truly move risk, and translating that work into outcomes leadership and auditors can understand.</p><p data-start="2589" data-end="2780" data-is-last-node="" data-is-only-node="">The bigger takeaway: vulnerability management is evolving from a reporting function into an execution discipline—where prioritization, context, and remediation speed define security maturity.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/vulnerability-managements-new-mandate-remediate-whats-real/" data-a2a-title="Vulnerability Management’s New Mandate: Remediate What’s Real"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fvulnerability-managements-new-mandate-remediate-whats-real%2F&amp;linkname=Vulnerability%20Management%E2%80%99s%20New%20Mandate%3A%20Remediate%20What%E2%80%99s%20Real" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fvulnerability-managements-new-mandate-remediate-whats-real%2F&amp;linkname=Vulnerability%20Management%E2%80%99s%20New%20Mandate%3A%20Remediate%20What%E2%80%99s%20Real" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fvulnerability-managements-new-mandate-remediate-whats-real%2F&amp;linkname=Vulnerability%20Management%E2%80%99s%20New%20Mandate%3A%20Remediate%20What%E2%80%99s%20Real" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fvulnerability-managements-new-mandate-remediate-whats-real%2F&amp;linkname=Vulnerability%20Management%E2%80%99s%20New%20Mandate%3A%20Remediate%20What%E2%80%99s%20Real" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fvulnerability-managements-new-mandate-remediate-whats-real%2F&amp;linkname=Vulnerability%20Management%E2%80%99s%20New%20Mandate%3A%20Remediate%20What%E2%80%99s%20Real" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>