The end of human-speed security

Why Mythos changes cybersecurity—and why data-layer security matters more than ever.

Cybersecurity was built around one assumption: Vulnerability discovery, exploitation and remediation would all happen at human speed. Anthropic’s recent announcement around Claude Mythos Preview—a restricted frontier AI model reportedly capable of autonomously discovering and exploiting software vulnerabilities across complex systems—suggests that assumption may no longer hold.

The significance of Mythos is not simply that it found vulnerabilities. Vulnerabilities have always existed. The larger implication is that the timeline between discovery, weaponization and exploitation may be collapsing toward zero. Most of the public discussion around Mythos has focused on offensive capability: The zero-days discovered, the exploits generated and its potential to accelerate both remediation and patch development. But the more important implication may be architectural. If attackers can move at machine speed, the traditional security perimeter becomes increasingly unreliable and the strategic center of gravity shifts downward toward the data layer itself.

The window has collapsed

The core finding from the weeks following Mythos’s announcement is not about a single model. It is about timing.

The UK AI Security Institute’s independent testing found that Mythos became the first model to autonomously complete a 32-step corporate network attack simulation, a task previously estimated to require approximately 20 hours of human expert work. Its assessment was unusually direct: Two years ago, frontier models could barely complete beginner-level cyber tasks. Now they can autonomously discover and exploit vulnerabilities across multi-stage attack chains.

The broader trendline reinforces the point. The median time from vulnerability disclosure to first observed exploitation has collapsed from 771 days in 2018 to just hours today. CrowdStrike’s latest threat data shows attacker breakout time averaging 29 minutes. A Forrester analyst described Mythos as creating “a race to remediate and patch before other AIs, in the wrong hands, discover these zero-days and rapidly write exploits.” 

For most of modern cybersecurity, defenders operated on a timeline measured in months or years. Vulnerabilities were discovered, disclosures were issued, patches were developed and enterprises gradually tested and deployed updates. Attackers often moved faster, but not exponentially faster. Mythos suggests a world where discovery, exploit generation and operational weaponization compress into hours. In that world, the traditional patch cycle no longer defines the pace of security. AI-driven reconnaissance does.

What has changed — and what hasn’t

Mythos did not create new classes of vulnerabilities. The authentication weaknesses, cryptographic flaws, privilege escalation paths and software supply chain gaps it exposed already existed. What changed is the timeline.

As several security researchers have noted, Mythos compresses the gap between vulnerability discovery and attacker awareness. Anthropic itself has acknowledged that comparable offensive capabilities are likely to diffuse into broader ecosystems, including open-weight models, within the next six to twelve months. 

The Mythos breach itself reinforced the point. On the same day Anthropic announced the model’s restricted release, an unauthorized group reportedly accessed it through a combination of contractor exposure, predictable URL patterns and shared credentials. Not through sophisticated AI attacks, but through ordinary supply chain weaknesses. Even the most advanced AI-assisted cyber capability in the world was still vulnerable to basic operational security failures.

That distinction matters because it reinforces a critical point: Foundational security failures remain foundational security failures regardless of how advanced AI becomes. The inverse is also true. The controls that continue to matter in an AI-accelerated environment are the same controls security teams have long known they needed, including encryption, tokenization, fine-grained access control, immutable auditability and privileged identity governance.

The challenge is therefore not inventing entirely new defensive primitives. The challenge is implementing the foundational ones comprehensively enough to survive AI-scale attack velocity.

The data layer is the new perimeter

If the vulnerability window is collapsing, the strategic question changes. The goal is no longer simply preventing intrusion. At AI speed, some level of intrusion must increasingly be assumed. The more important question becomes what still protects sensitive data after the application boundary fails.

That is why security architecture is increasingly shifting toward the data layer itself.

Encryption and tokenization become more important because transport-layer protection alone is insufficient when the underlying software libraries themselves may be compromised. Mythos reportedly surfaced weaknesses across TLS-related implementations, certificate validation paths and cryptographic infrastructure. 

In a modern data security architecture, sensitive field-level data should remain protected both at rest and in transit through encryption and tokenization. When protection travels with the data object itself, a compromised application does not automatically become a compromised dataset. The attacker gains access to tokens or encrypted values rather than raw sensitive information, significantly reducing the blast radius of a successful intrusion.

Fine-grained access control then governs who or what can access plaintext data under specific conditions. Access decisions increasingly need to account for identity, context, data classification, purpose and runtime behavior rather than relying solely on network location or static roles. This becomes especially important as AI agents, rather than just human users, begin interacting directly with enterprise data systems and automated workflows. Organizations cannot effectively govern data they cannot discover, classify, inventory and monitor at the point of access.

Immutable auditability matters equally. When attacker breakout time is measured in minutes, investigation and containment depend on real-time, tamper-evident visibility. Enterprises need attributed lineage across both human and non-human actors, including AI agents operating inside workflows, pipelines and automation systems.

Agentic governance is the final layer. AI systems with deep environment access, broad credentials and unrestricted tooling effectively become privileged operators. Those systems need to be governed similarly to other forms of privileged automation, with scoped access, segmented environments, constrained credentials and comprehensive logging.

Why this gets bigger from here

Anthropic’s restrictions around Mythos are unlikely to remain unique for long. Frontier cyber capabilities will diffuse through competing commercial models, open-weight ecosystems, state-sponsored adaptation and downstream derivative systems.

The strategic implication is important: Organizations should not build security strategies around the assumption that only a handful of actors will possess these capabilities. They should build around the assumption that eventually everyone will.

The long-term outcome may ultimately favor defenders. AI-assisted vulnerability discovery could improve software quality, patch generation and secure development practices over time. But the transition period may be highly unstable. Security teams are entering an environment where attack capability scales faster than operational remediation capacity. That gap is where the next wave of enterprise cyber risk is likely to emerge.

Where Databolt fits

Capital One Databolt was designed around a simple assumption: Application boundaries could eventually fail. That assumption is no longer theoretical.

Consider the wolfSSL vulnerability reportedly surfaced by Mythos, a certificate verification flaw affecting billions of connected systems, including IoT devices, industrial infrastructure and embedded environments. 

In many cases, those systems may never realistically receive patches. The strategic question then becomes what still protects the underlying data if the transport or application layer is compromised.

For organizations with data-layer encryption and tokenization, the attacker still faces another defensive boundary. For organizations relying solely on perimeter or transport security, the answer may be very different.

Databolt’s tokenization capabilities are designed to protect sensitive data directly at the object layer, including structured data such as PII, PCI and PHI, along with certain unstructured data, independent of the applications that use it.

Its fine-grained access controls apply governance at the point of data access itself, allowing both human users and AI agents to operate under the same policy architecture as enterprise AI adoption expands. Its audit architecture captures attributed lineage of data access in logs, helping organizations reconstruct and contain activity in environments where exploitation can move faster than traditional patch cycles.

The broader point is not that AI changes the need for foundational security. It is that AI increases the cost of not having it.

Conclusion

The organizations best positioned for an AI accelerated threat landscape are unlikely to be the ones reacting most aggressively to the latest AI security headline. They will be the ones that invested early in foundational security architecture under the assumption that application boundaries and network perimeters would eventually fail.

In many ways, Mythos does not change the fundamental principles of cybersecurity. Organizations still need to know where sensitive data resides, control access to it, protect it cryptographically and maintain reliable visibility into how it is used. What Mythos changes is the speed at which weaknesses can be identified and operationalized.

That acceleration has important architectural implications. Security models that depend primarily on delayed detection, periodic remediation cycles or perimeter integrity become increasingly difficult to sustain when vulnerability discovery and exploit generation operate at machine speed.

The strategic response is therefore less about chasing every new AI security capability and more about strengthening the controls that remain effective even after an application or infrastructure boundary has been compromised. In practice, that increasingly means shifting security closer to the data layer itself.

The future of cybersecurity may operate at AI speed, but resilience will still depend on the quality of the underlying foundations.


Leon Bian, VP and Head of Databolt Product at Capital One Software

Leon Bian is VP and Head of Databolt Product at Capital One Software, the enterprise B2B software business of Capital One. Leon leads a team of product managers responsible for the development of Capital One Databolt, a tokenization solution that enables businesses to secure sensitive data at scale. Leon is a seasoned cybersecurity expert with over two decades of leadership experience in technology sectors, including AI, big data, blockchain, fintech and wireless.

Related Content

Data security concept illustration showing a yellow shield icon, surrounded by four smaller shield icons.
Article | April 13, 2026 |5 min read
Computer screen with a blue shield and keyhole on a dark blue background.
Article | February 18, 2026 |3 min read
Dark blue background with text "Speaker recap AWS re:Invent," a light blue circle featuring an illustration of a megaphone, and a chartreuse half circle
Article | December 8, 2025 |3 min read