惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

F
Full Disclosure
P
Proofpoint News Feed
MyScale Blog
MyScale Blog
Y
Y Combinator Blog
N
Netflix TechBlog - Medium
Google DeepMind News
Google DeepMind News
M
Microsoft Research Blog - Microsoft Research
L
LangChain Blog
云风的 BLOG
云风的 BLOG
M
MIT News - Artificial intelligence
C
Check Point Blog
F
Fortinet All Blogs
I
InfoQ
Recent Announcements
Recent Announcements
H
Hackread – Cybersecurity News, Data Breaches, AI and More
D
DataBreaches.Net
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
人人都是产品经理
人人都是产品经理
量子位
L
LINUX DO - 热门话题
J
Java Code Geeks
The Register - Security
The Register - Security
A
Arctic Wolf
T
True Tiger Recordings
Vercel News
Vercel News
T
Threat Research - Cisco Blogs
G
GRAHAM CLULEY
F
Fox-IT International blog
阮一峰的网络日志
阮一峰的网络日志
K
Kaspersky official blog
D
Darknet – Hacking Tools, Hacker News & Cyber Security
S
Schneier on Security
P
Proofpoint News Feed
Recent Commits to openclaw:main
Recent Commits to openclaw:main
Cisco Talos Blog
Cisco Talos Blog
T
Troy Hunt's Blog
李成银的技术随笔
N
News and Events Feed by Topic
Security Latest
Security Latest
Martin Fowler
Martin Fowler
小众软件
小众软件
月光博客
月光博客
大猫的无限游戏
大猫的无限游戏
Application and Cybersecurity Blog
Application and Cybersecurity Blog
酷 壳 – CoolShell
酷 壳 – CoolShell
B
Blog
Microsoft Azure Blog
Microsoft Azure Blog
C
Cybersecurity and Infrastructure Security Agency CISA
Engineering at Meta
Engineering at Meta
T
The Blog of Author Tim Ferriss

Security @ Cisco Blogs

Enhancing Cisco Secure Email Gateway: Safer Clicks and Cleaner Files AI-generated reporting: Lessons learned from Cisco Talos Incident Response Inside the SOC: AI-powered DNS defense against ransomware State-sponsored actors, better known as the friends you don’t want Security Insights: A Threat-First View for the Platform That Enforces Access From Strategy to Architecture: How Cisco is Building a Quantum-Safe Future AI-Ready, Simpler, and More Secure WAN: Cisco SD-WAN Innovations Designing for What’s Next: Securing AI-Scale Infrastructure Without Compromise Preparing for Post-Quantum Cryptography: The Secure Firewall Roadmap Mobile World Congress 2026: AI-powered Network Security Powering MWC Barcelona – Building a Unified SOC and NOC with Splunk in Record Time Inside the Mobile World Congress 2026 SOC: Detecting Shadow Traffic with Firepower 6100 AI-powered Network Security at the Mobile World Congress 2026 SNOC Data Optimization in Security: A Splunk Architect’s Perspective Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders The Agent Trust gap: What Our Research Reveals About Agentic AI Security Zero Trust for Agentic AI: Safeguarding your Digital Workforce Meet Your Incident Responders
Cisco’s Risk-Based Vulnerability Disclosure in the Age of AI
Russ Smoak · 2026-05-23 · via Security @ Cisco Blogs

As the cybersecurity landscape rapidly evolves, driven by groundbreaking advancements in artificial intelligence (AI), Cisco is adapting its vulnerability disclosure practices to meet the challenges and opportunities presented by these technologies. Notably, the recent introduction of frontier models with advanced cybersecurity reasoning capabilities is transforming how vulnerabilities are discovered, analyzed, and mitigated. These AI capabilities enable unprecedented speed and scale in identifying security issues, while also allowing network defenders to continuously evolve to address emerging threats. Cisco recognizes that network infrastructure is critical, and demands for availability are unrelenting. The AI evolution puts pressure on defenders to absorb and deploy software at a greater pace.

Harnessing AI to Enhance Cybersecurity

Cisco is actively leveraging advanced AI Models to accelerate finding vulnerabilities and driving remediation. Deploying these models into our security processes allows us to find and fix vulnerabilities at a pace and previously unattainable. At the same time, we recognize that adversaries will also take advantage of these evolving AI capabilities, increasing the urgency and complexity of cybersecurity defense. We prioritize cutting edge technologies and research to continuously evolve our tools, techniques, and processes by incorporating capabilities such as: AI-augmented scenarios into red teaming exercises, and deep security evaluations of our products against the sophisticated tactics enabled by these models.

Prioritizing Risk to Empower Customers

Cisco has a long history of disclosing vulnerabilities. Our public facing Security Vulnerability Policy (SVP) describes our process in detail including how to report and receive vulnerability information. We continue to adjust our practices within the goals of our overall policy: security, transparency, trust.

Cisco is evolving our risk-based vulnerability disclosure model. This approach focuses on increasing the visibility of detailed technical information for vulnerabilities that pose the highest risk—those that are critical, actively exploited, or have a higher likelihood of exploitation. By prioritizing disclosures based on risk, we enable customers to focus on their patching and mitigation efforts where they are most needed and urgent.

For vulnerabilities that are found internally with and assessed as lower likelihood for exploitation and lower impact, Cisco may change the level of detail we share, moving our focus to remediation and upgrades. This means that some internally found issues that have a CVSS score in the range for a standalone advisory will no longer be communicated as standalone disclosure.

Updating the Disclosure Cycle for Lower Severity Vulnerabilities

To aid in risk management, Cisco will provide high-level data on our website for releases that contain patches for internally discovered vulnerabilities. This is intended to direct customers to security hardened releases that should be downloaded and qualified for deployment. This update to the traditional disclosure sequence allows customers to understand when releases contain general security patches. Cisco may release further data summarizing changes to the software to address the findings after the initial posting of the software.

Maintaining Our Commitment to Third-Party and Open-Source Code

Our existing practices for vulnerabilities in third-party or open-source components remain unchanged. For high severity issues in these areas, we will continue to post timely responses and provide regular updates as patches are developed and released.

Looking Ahead: The Future of AI and Cybersecurity

The capabilities of frontier AI models will continue to evolve, driving both innovation and new challenges in cybersecurity. Cisco will continue to adapt and lead in this dynamic environment by leveraging AI-driven insights for our security operations and disclosure practices. Our goal is to empower customers with timely, prioritized, and actionable information, enabling them to strengthen their security posture in an increasingly complex threat landscape.

Cisco will use our voice in the vulnerability disclosure space with the intent of driving pragmatic changes that help the industry align and scale to this expected increase in volume.

Cisco’s Product Security Incident Response Team (PSIRT) remains dedicated to collaborating with customers, researchers, and industry partners to deliver transparent, risk-focused vulnerability disclosures that reflect the realities of AI-enhanced cybersecurity.