May 5, 2026
Greg Reber



Every few years, the security industry convinces itself that the entire game has changed and that previous assumptions must be thrown out immediately in favor of whatever new thing has just suddenly appeared (with absolutely fantastic marketing). Sometimes this is correct. More often, it is the intellectual equivalent of a car alarm going off in a parking garage, loud, insistent, and almost always indicating that a shopping cart rolled into someone's bumper rather than that anyone is actually stealing anything.
Our latest example: Mythos is real, and the capabilities Anthropic has demonstrated may be unprecedented, but it makes the main pain points of vulnerability management even more acute.
The reason requires thinking carefully about what Mythos actually is versus what the coverage of Mythos describes it as. Anthropic's marketing people say it is ‘a code analysis engine of extraordinary depth and precision’, although that remains to be verified. The vulnerabilities it has spotted have, in some cases, survived decades of human review and millions of automated security tests, and the exploits it develops are increasingly sophisticated. That is a remarkable capability. It is also a capability that operates on code that is handed to it.
It is a depth tool that requires scope before the interesting work begins, and scope is precisely the problem that most organizations have not solved.
Accelerated discovery, absent a calibrated prioritization model, an accurate asset inventory, and the capacity for remediation, does not fundamentally enhance security. It merely inflates the theoretical vulnerability pile and ratchets up the urgency, while leaving the hardest, most structural components of the problem exactly where they were.
The cyber insurance company, Coalition, has spent nearly a decade building on the thesis that the data required to underwrite well and the data required to defend well are the same data. In a recent article (After Mythos: What Actually Changes for Cyber Risk), they have concluded that the Mythos moment is real but that it represents the end of point-in-time, attestation-based cyber underwriting rather than the end of continuous-telemetry, tech-first security programs.
That distinction matters enormously. What Mythos disrupts is the model where a company fills out a questionnaire once a year and a carrier prices the risk based on self-reported controls. What Mythos does not disrupt, and in fact accelerates the need for, is the model where an organization continuously maps its own external attack surface, classifies vulnerabilities by whether they have historically generated actual financial losses, and backs that program with financial accountability.
Mythos does not classify vulnerabilities based on actual exploit data. Approximately 0.2% of CVEs correlate with insurance claims, and another 1.2 to 2% enable compromise and lateral movement, based on documented incident response cases. Mythos finding more vulnerabilities faster makes the theoretical vulnerability pile larger. It does nothing to identify which items in that pile have historically cost organizations money. What’s needed is continuous attack surface monitoring and scanning for the vulnerabilities that are more than theoretical, because knowing what is exposed and knowing what actually matters are both essential, and neither is sufficient without the other.
The important thing to understand about Mythos is that it raises a question rather than answering one.
The question it raises: which of the bajillions of vulnerabilities it finds should anyone actually care about?
That question has always been the hard problem, and the arrival of a better vulnerability discovery engine does not make it easier. The structural advantages of continuous-telemetry, tech-first approaches become impossible to ignore in a Mythos-era world for specific, compounding reasons. An asset inventory that is accurate, a vulnerability classification model calibrated against real claims data, and a warranty that creates financial accountability for whether the program performs as advertised are actually validated by an AI that discovers more vulnerabilities.
The signal defined by the presence of real vulnerabilities that have verifiably led to financial loss gets more valuable precisely as the noise produced by the broader security ecosystem gets louder, and Mythos just turned the volume up considerably.