Same Attacks. Faster Tools. A System Under Pressure.
- Mihir Datar
- Feb 5
- 3 min read

One theme came through clearly at this year’s cybersecurity summit: we are not facing fundamentally new attacks, we are facing the same attacks executed faster, in parallel, and at scale.
That distinction matters.
The problem isn’t novelty. It’s speed, coordination, and compression — and most enterprise defenses were never designed for that operating model.
Across sessions from Horizon3.ai, Cerby, Sonatype, and Stillwater, a consistent picture emerged:
Attacks no longer arrive one at a time — and neither do the consequences.
The Attacker Has Already Scaled
Automation has changed the shape of offense.
What once required skilled operators working sequentially can now be executed by coordinated tooling that:
Probes many weaknesses at once
Exploits multiple control planes in parallel
Collapses the time between discovery and impact
The takeaway isn’t that attackers are suddenly smarter. It’s that their workflows now scale faster than most defensive and governance processes.
Annual testing, periodic reviews, and slow remediation cycles are simply mismatched to this reality.

Identity Is Still Fragmented, and Humans Fill the Gaps
Identity was supposed to be the stabilizing control plane.
SSO, SCIM, MFA, lifecycle automation — in theory, these should reduce risk and simplify governance. In practice, a large percentage of enterprise applications still don’t support modern identity standards.
The result is familiar:
Manual provisioning and deprovisioning
Inconsistent MFA enforcement
Long-lived access that outlasts business need
Humans become the control mechanism — and humans don’t scale at machine speed.
This isn’t an IAM failure so much as a systems integration gap that quietly accumulates risk.

Software Trust Is Under Strain
At the same time, software supply chains are under unprecedented pressure.
Open-source consumption has exploded. Malware is flooding public registries. Signal-to-noise ratios are deteriorating just as regulatory expectations accelerate across jurisdictions.
What stood out most wasn’t any single vulnerability — it was the volume and velocity:
More components
Faster release cycles
More policy requirements
Less time to reason about risk
Security teams are being asked to make high-confidence decisions in environments designed for throughput, not discernment.
Regulation and Insurance Are Now Forcing Functions
One of the most sobering themes came from the incident response perspective.
Cyber insurance, regulatory scrutiny, and legal accountability are no longer abstract concerns. They are conditions of operation — and they increasingly assume organizations can demonstrate readiness, not just react to failure.
Questions leaders should be able to answer today:
Do we have visibility when something goes wrong?
Do we know who to call — and can we call them fast?
Are backups actually recoverable and protected?
Can we operate if identity systems are unavailable?
These aren’t technical questions. They’re organizational ones.

The Real Divide: Left of Boom vs Right of Boom
A useful mental model surfaced repeatedly: the boom cycle.
Left of boom is where preparation lives — governance, visibility, testing, resilience, and practice.
Right of boom is where cost lives — incident response, forensics, legal exposure, downtime, and reputational damage.
Organizations don’t choose whether they’ll pay. They choose when — and how much control they retain when they do.
A Quiet Shift Is Underway
Taken together, these sessions point to a broader transition:
From static controls → continuous validation From manual processes → automation with oversight From annual confidence → daily evidence From reacting to incidents → designing for inevitability
This isn’t about panic or prediction. It’s about alignment — between how attacks operate and how organizations defend, govern, and respond.
The question for leaders isn’t “Are we secure?” It’s:
Are our systems, people, and processes built to move at the speed of the environment we’re already in?
That answer will increasingly define resilience — long before the next headline does.




Comments