
Falco Feeds extends the power of Falco by giving open source-focused companies access to expert-written rules that are continuously updated as new threats are discovered.

Cloud security has matured, but we’ve officially hit our human limits. According to data from the Sysdig 2026 Cloud-Native Security and Usage Report, it’s high time to pivot to machine speed.
For years, security teams have worked to keep pace with complex, sprawling cloud environments by adding dashboards, workflows, and people, while simultaneously consolidating for simplicity’s (and sanity’s) sake. That approach got us far, but this year’s data shows us something important: defenders are hitting their limits in the age of AI. Environments are growing fast, kill chains and exploitations are still shrinking, and the number of identities, workloads, packages, and signals is too large for humans alone to manage effectively.
But don’t get it twisted: this does not mean security teams are falling behind. In fact, it’s quite the opposite.
Teams are making meaningful progress where it matters most. They are adopting higher-fidelity runtime detections, increasing implementation of automated response, building secure foundations for AI, and reducing exploitable vulnerabilities present at runtime. The shift from the “hustle hard” human effort era to machine-scaled defense has begun.
Based on real-world telemetry, the ninth annual Sysdig report uncovers organizational adaptations and where security leaders should focus next.
Vulnerability management has reached the human limit
With the right prioritization and improved scanning, we’ve seen consistent progress in vulnerability management since we began tracking it in 2023. But remediation is still largely human-driven, and that’s the current bottleneck.
This year’s data shows that the percentage of critical- and high-severity vulnerabilities in use has plateaued, with organizations still maintaining about 5.5% of vulnerable images in running workloads. At the same time, running images with known exploits dropped nearly 75% year over year.
Paired with the reduction in time-to-exploit seen at the end of 2025, and with some vulnerabilities being exploited within hours of publication, this combination of vulnerability management statistics tells an important story. Organizations are still making improvements and reducing the most dangerous risks, but it isn’t enough to keep driving the overall number down. This includes vulnerabilities not yet exploited but which might possibly be actively exploited within hours or less. To break through the ceiling, security teams need autonomous remediation workflows led by strong human-defined guardrails.
Runtime security proves its value (again and again)
Runtime has established itself as the clearest source of truth for cloud security as environments scale and grow more distributed and automated.
Now, more than 70% of organizations use behavior-based detections, and that shift toward stateful, contextual detection is reducing noise and improving trust.
Trust in high-fidelity detections is making way for more automated response actions. This year, 140% more organizations are automatically killing processes when specific detections are triggered. Rather than waiting for manual, human-defined validation and containment, mature teams are letting machines handle more of the initial response.
AI adoption continues to mature quickly and securely
Initially, AI was a tool consumed through platforms. However, it’s quickly become a core part of an organization’s infrastructure itself.
This year’s report found 25x growth year over year in AI-specific packages, along with nearly 6x more machine learning (ML) packages than AI packages. This explosive growth signals a move from experimentation to the building of production-grade AI systems, internal services, and deeper integration.
The regional data is also particularly interesting. More than half of AI and ML packages belong to European organizations, meaning regulation is not slowing adoption. In fact, clear regulatory guidelines may be helping organizations innovate with confidence.
Identity management is the new firewall
Identity management is the firewall of modern cloud environments – it’s a very important security factor that is often left to the wayside and is the key insertion point for the majority of breaches. Truth be told, it’s been a while since we’ve been any good at identity management (if ever…).
This year’s data continues to tell a story of risk that falls on human accounts, multi-cloud environments, and everything in between. And while humans are still more risky than machine identities, they only account for 2.8% of the accounts analyzed. It’s time for identity security to shift away from human-driven management. It’s not working. Identity management is one of the clearest, albeit complex, cloud security use cases for continuous analysis, behavioral monitoring, and automated policy enforcement.
Open source security continues to gain ground
The push for machine-scaled security isn’t lost on the open source community. Organizations are looking for security systems that can operate continuously and at cloud speed. Open source runtime tooling is becoming the strategic choice.
More than 9,000 organizations use Falco, with Europe representing 34% of total usage. The all-around growth reflects the increasing demand for transparent, auditable, and flexible runtime detection, especially in regions and industries where data sovereignty and regulatory alignment matter the most.
Conclusion
The takeaway from this year’s data is simple: the hustle-hard era is ending. The role of the security team is evolving, and the next phase of cloud security maturity does not include manually chasing alerts, creating tickets, reviewing permissions, or driving remediation. Security teams will increasingly define guardrails, policies, and trust boundaries that let machines operate securely at speed.
To see all the data behind these trends, and explore the rest of the story, read the full Sysdig 2026 Cloud-Native Security and Usage Report.
