The Vulnerability Management Problem - Maze

Back to Resources
June 12, 2025 Company Product

The Vulnerability Management Problem

AJ

ADRIAN JÓŹWIK

When we decided to start Maze, our goal was to be different from every other security company out there. Instead of blindly chasing ARR numbers, we wanted to build a product our users truly love. We believe that the first step to building a great company is solving real pain—not just putting a patch on it and hoping for the best.

The Vulnerability Management Problem

When we decided to start Maze, our goal was to be different from every other security company out there. Instead of blindly chasing ARR numbers, we wanted to build a product our users truly love. We believe that the first step to building a great company is solving real pain—not just putting a patch on it and hoping for the best. 

To solve a problem, you first have to truly understand it. That’s why we set out to talk to as many people as we could. Over the past year and a half, we’ve had hundreds of conversations with security leaders at companies of all sizes. The response from the community was incredible and led to many candid discussions about what’s broken, what’s frustrating, and where we—as an industry—are falling short. 

The Vulnerability Management Crisis

One topic kept coming up again and again: we have a major problem in how we handle vulnerabilities

Despite deploying dozens of tools over the years, teams are drowning in noise. And it's not surprising: the number of vulnerabilities is growing at ~40% year over year. Time to exploit is going down faster than ever, from 32 days in 2022 to 5 days in 2023, and with AI this trend is likely to continue. Exploitation of vulnerabilities has now overtaken phishing as the second most common initial access vector—and it's quickly catching up to credential abuse. 

We saw this problem firsthand when leading product and engineering teams at Amazon, Elastic and Tessian. There was always a tension between how much engineering effort should go toward patching vulnerabilities versus building and improving the core product—the one that actually drives business growth. 

The Cost of Getting It Wrong

Some companies only have the bandwidth to patch critical findings—knowing full well that many dangerous vulnerabilities are lurking in the lower tiers, just waiting to be exploited. 

Others try to patch as much as they can, which often leads to massive investment and growing friction between engineering and security teams. Let’s be honest: most engineers know they’re being asked to patch false positives.

 Then there are companies trying to do the right thing by manually triaging every finding before handing it off to engineering. This approach is admirable—but no security team can investigate hundreds of thousands (or millions) of alerts manually. It's just not scalable. 

None of these solutions work well.

“Shift left” just means engineers end up patching false positives earlier in the pipeline. Legacy tools that "re-score" findings rarely help—you're still looking at the same volume, just with slightly different severity numbers. (And really, what’s the meaningful difference between a 6.0 and a 7.5?)

CVSS was never enough. EPSS is better, but still lacks the most critical component: internal context. The only way to get that today is through manual investigation—and that takes hours per finding. It’s not sustainable, and everyone knows it.

We invest more and more resources to triage and patch vulnerabilities, but it’s never enough. At the same time, we almost never know if we managed to patch the few really bad vulnerabilities that could actually lead to a breach. Unfortunately, many security teams are crossing their fingers and hoping for the best.

Where We Go From Here

At Maze, we’re dedicated to changing how teams understand and act on vulnerabilities—especially in cloud and application environments. Our goal is to bring real context into the decision-making process, so teams can focus on what matters, build trust between security and engineering, and measurably improve their risk posture. 

We’re not just building another tool that generates alerts. We’re building a system that helps teams answer the question: 

What’s the most efficient thing I can do next to make my environment safer?

March 12, 2026 Product
Exploitability: The Fastest Way to Fewer False Positives
Read more
February 25, 2026 Product
AI Remediation Developers Actually Want to Use
Read more
January 20, 2026 Security
2025: The Year Vulnerabilities Broke Every Record
Read more
January 19, 2026 Product
Matt Johansen's First Look at Maze
Read more
January 15, 2026 Product
Maze Data Sheet
Read more
January 5, 2026 Security
Vulnerability Déjà Vu: Why the Same Bug Keeps Coming Back
Read more
December 29, 2025 Security
The Cross-Platform False Positive Problem: Why Vulnerability Scanners Flag Windows CVEs on Linux
Read more
December 22, 2025 Security
The Language Barrier: Why Security and Engineering Are Never Aligned
Read more
December 4, 2025 Product
An Analyst's Take on Maze: AI That Actually Moves the Needle on Vulnerability Management
Read more
December 4, 2025 Product
Should CISOs Build or Buy?
Read more
November 27, 2025 Security
Checkbox Security - Compliance Driven Security is Bound to Fail
Read more
November 25, 2025 Security
The Hidden Problem With CVSS: The Same CVE Gets Different Scores
Read more
November 12, 2025 Product
Meet Maze: AI Agents That Bring Clarity to Vulnerability Chaos
Read more
October 22, 2025 Company
Maze Named a Cloud Security Segment Leader in the 2025 Latio Cloud Security Report
Read more
August 1, 2025 Security Automation
Why we can't just auto-fix all our vulnerabilities away, yet
Read more
June 26, 2025 Case Studies
AI Vulnerability Analysis in Action: CVE-2025-27363
Read more
June 19, 2025 Product
From Rules to Reasoning: The Shift That Made Maze Possible
Read more
June 10, 2025 Company
Launching Maze: AI Agents for Vulnerability Management
Read more