Cybersecurity experts, including cybersecurity professionals at non-vendor and vendor companies, academics, and sources close to the topic, what are the current pros and cons of zero trust? Please share real-world examples and vendor neutral language.
posted5/20/2025
deadline5/29/2025
processing
published9/23/2025
Recently published by Communications of the ACM
Looking for High School or College Teaching Gen AI literacy.
I need cybersecurity, vulnerability, and threat intelligence experts, and companies hit with these attacks.
Security holes—finders, keepers, and big losers
‘It’s mine! I saw it first!’ That’s what you might expect to hear from children fighting over an interesting discovery. Whether lost money, a toy, or something only an adult should have (use your imagination), children will claim the right to keep it, show it off, and maybe even trade it for something. That’s how cybercriminals respond to finding zero-day vulnerabilities—those holes in networks, computers, and software no one else knows, and no one has had a chance to fix. They will keep it to themselves until they plan to use it in an attack, or they will sell it on the dark web.
Based on the latest statistics, threat actors had much to celebrate recently regarding zero days. According to a 2025 H1 ForeScout Vedere Labs research report, zero-day exploits increased 46% over the previous 12 months.
Questions:
Who is responsible for discovering and exploiting these zero-day vulnerabilities?
What have been the effects on victim companies and affected users? How quickly have companies responded to these zero days?
What significant product lines or technology stacks are affected? How are companies adjusting their vulnerability management and security processes? Are those measures effective?