Comment by krzyk
6 days ago
People in my company sounded underwhelmed by it. It usually was founding issues by not understanding deployment (or not being fed that info).
6 days ago
People in my company sounded underwhelmed by it. It usually was founding issues by not understanding deployment (or not being fed that info).
You might point them at the cloudflare blog about deploying mythos - I found it interesting. Upshot — as your folks discovered, deployment, harness, and utilization method matters for mythos and is a bit different than how you’d deploy a coding agent for writing code, but if you do that, you get something capable of end to end chaining and reasoning about a much broader class of vulnerabilities.
No personal experience with it. But the security team writeups I’ve read are significantly more positive about it than you describe, so it might be worth a second look.
A friend of mine had hands on experience, it’s not the intelligence of it, it’s the speed.
You used to have a couple of days to close a breach, now it 2 hours.