Dan Jones at Tanium explains why vulnerability backlogs are becoming a business risk and how organisations can mitigate this risk

Many organisations are now carrying significant levels of security debt, with known vulnerabilities left unresolved for extended periods. These are not abstract risks sitting in reports, but live weaknesses in active systems, still accessible, still exploitable, and still capable of causing harm. For business leaders, this becomes a question of how much known risk the organisation is carrying at any given time, and how quickly it can be reduced.
While visibility has improved, gaps still remain. Research shows that 67% of UK IT leaders lack complete visibility into all work devices across their business. Even where vulnerabilities are identified, many organisations now have more insight than ever into their vulnerabilities, but that does not automatically make them more secure. Knowing about a risk is not the same as reducing it. The result is a growing and often underestimated problem: vulnerability backlogs.
A problem driven by speed and scale
Security teams are now dealing with unprecedented scale. In 2025 alone, more than 48,000 vulnerabilities were disclosed globally, continuing a year-on-year rise that shows no sign of slowing.
At the same time, attackers are moving faster. Automation and AI-assisted tools allow them to scan for weaknesses and exploit them at scale, often within hours or days of disclosure. What once took weeks can now happen in a matter of hours.
This creates a difficult imbalance. Exposure points are discovered faster than organisations can remediate them, and over time, that gap turns into a backlog.
Why backlogs continue to grow
Despite the importance placed on exposure management, many organisations are still struggling to make it effective. While 93% of security professionals recognise its significant importance, 70% report that their programmes are only somewhat effective or worse.
In many environments, exposure management still follows a fragmented and often linear process. Risks are identified, prioritised, and then passed between teams for remediation. While this model has improved visibility, it has also introduced delay – and the results reflect that gap.
Data can quickly become outdated, particularly when environments are constantly changing. Context is often incomplete, making it difficult to understand which vulnerabilities truly matter. Responsibility is split across security and IT operations teams that may not share the same priorities, tools or timelines. By the time an exposure point is scheduled for remediation, the risk landscape may already have shifted.
Prioritisation adds another layer of complexity. Severity scores are still widely used, but they do not always reflect real-world risk. In practice, only a small proportion of vulnerabilities labelled as critical are actively exploitable in a given environment. This creates a situation where teams can end up focusing on what appears urgent on paper, while genuinely exposed systems remain unaddressed.
Over time, this combination of volume, speed and fragmented workflows makes backlog accumulation almost inevitable. In fact, organisations have reported that it takes an average of 271 days to address just 13% of known vulnerabilities. This is a model built for a slower time; one that can’t keep up with the pace of modern threats.
The real-world impact of delay
The consequences of these backlogs are becoming increasingly visible. As attackers continue to automate their approach, the time between disclosure and exploitation continues to shrink. This means that even short delays in remediation can create a window of opportunity.
Recent high-profile incidents have shown how quickly exposed data or unpatched systems can be exploited once vulnerabilities are identified. In practical terms, that window can be enough to enable fraud, disrupt services, or expose sensitive data.
For smaller organisations, a single incident can have outsized consequences, whether through financial loss, operational downtime or long-term reputational damage. Even in larger organisations, the cumulative impact of unresolved vulnerabilities can erode resilience over time. Systems become harder to manage, risk becomes harder to quantify, and response efforts become increasingly reactive.
This is why vulnerability backlogs are now a risk to the whole business that directly affects continuity, compliance, and trust.
Moving from visibility to action
Effective visibility is the foundation for addressing vulnerability backlogs and the bedrock of broader exposure management. Without a real-time, complete view of the environment, organisations cannot accurately identify risk, prioritise it, or act on it with confidence. The challenge is ensuring that risk is reduced as quickly as it is identified, preventing exposure from accumulating into a backlog.
The reality is that traditional vulnerability management approaches were not designed for the speed, scale, or complexity of modern environments. Rather than relying on periodic scans and delayed remediation cycles, organisations are increasingly looking to maintain a real-time view of their environment. This allows them to identify changes as they happen and respond accordingly, rather than working from outdated snapshots.
At the same time, there is a growing recognition that vulnerabilities cannot be viewed in isolation. Real-world risk is shaped by a combination of factors, including asset criticality, exposure to external networks, and evidence of active exploitation. Understanding this broader context makes it possible to prioritise more effectively and focus on reducing the exposures that matter most.
Just as importantly, organisations are beginning to close the gap between security and IT operations. When both teams operate from the same real-time data and shared workflows, the process of moving from identification to remediation becomes faster, more consistent, and more accountable. This reduces friction and helps prevent vulnerabilities from lingering unresolved.
This is where exposure management becomes critical – shifting the focus from identifying vulnerabilities to actively reducing risk across the environment.
Leading organisations are already taking this a step further by adopting autonomous IT. By combining real-time visibility with automated, policy-driven remediation, they are able to reduce reliance on manual processes and respond at machine speed. This closes the gap between detection and action before backlogs can take hold.
Why remediation speed defines resilience
As the volume and velocity of threats continue to increase, resilience is becoming a question of speed. The organisations that are best positioned are not those that can identify the most vulnerabilities, but those that can reduce them quickly and consistently.
This means shortening the time between detection and remediation, reducing reliance on manual processes, and ensuring that risk is addressed as part of day-to-day operations rather than as a separate, delayed activity.
Vulnerability backlogs are more than a metric. They are a signal of how effectively an organisation is managing exposure in real time. In today’s threat landscape, the organisations that succeed will be those that can reduce exposure quickly and consistently, before it has the chance to build into real risk.
Dan Jones, Senior Security Advisor at Tanium
Main image courtesy of iStockPhoto.com and da-kuk

© 2025, Lyonsdown Limited. Business Reporter® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543