Vulnerability remediation has always been a challenge, but now, it’s a race. Attackers are exploiting known weaknesses faster than many teams can respond, and AI is accelerating that shift. Traditional remediation methods aren’t built for this pace. That’s why we made vulnerability remediation the focus of our latest webinar.
If you missed the session, the recording is now available below:
Led by David Gray, Solution Architect Team Lead at Vicarius, we explored what security teams are facing today, and what needs to shift in how we prioritise, respond, and remediate.
So what’s really changed?
It’s not just the number of vulnerabilities.
It’s the pace at which they’re being found and exploited.
Over 40,000 vulnerabilities were published in 2024, up from 30,000 the year before. Many teams are patching as fast as they can, yet exploitation is now happening in days, not months. Sometimes, hours.
AI is playing a big role in that.
As David pointed out, large language models are already being used to generate exploits directly from CVE advisories, with a success rate that’s difficult to ignore. That’s no longer theory. It’s happening.
The real problem isn’t patching.
It’s response time. It’s visibility.
It’s prioritising based on what actually matters.
And more often than not, that’s where traditional remediation starts to fall short. Multiple systems, inconsistent processes, blind spots in tooling, and crucially, not enough people to manage it all.
You can’t defend what you don’t know is there.
And you can’t remediate at scale without a clearer way to reduce the noise.
That’s where AI-led remediation has a place, not to replace people, but to support them. By helping surface the vulnerabilities that genuinely carry risk. And, where possible, helping automate the response.
What we discussed.
During the session, David covered:
- How attackers are using AI to increase the volume and speed of exploitation
- Why CVSS scores and spreadsheets don’t reflect real risk
- Where remediation often gets stuck and how to reduce the bottlenecks
- What AI-supported remediation can look like today (not just in future roadmaps)
- Why trust in automation takes time and how to build it step by step
- How legacy systems, configuration issues, and unsupported apps still widen the gap
We also touched on tools, mindsets, and where the shift needs to start.
Because patching alone won’t close the gap. But visibility, prioritisation, and automation might.
What’s next?
If you’re dealing with any of this, unclear risk, delayed remediation, or internal pressure to move faster, we’d be happy to continue the conversation.
And if there’s a topic you’d like us to cover in a future webinar, let us know. Because for all the changes AI is bringing, some things haven’t changed: people still need clarity, and good decisions still start with the right questions.
Get in touch if you’d like to explore how Secon and Vicarius can support your team as vulnerability remediation strategies evolve.