Tech Sentinel
industry

Cybersecurity Burnout Is a Structural Problem, Not a Personal One

A Sophos survey of 5,000 practitioners found 76% experiencing burnout — and it's getting worse. As AI accelerates vulnerability discovery, the operating model that created this problem is about to be stress-tested even harder.

By Tech Sentinel Newsroom ·

A thread in r/cybersecurity this week went unremarkable in format — practitioner, Patch Tuesday, stupid o’clock, four hours of sleep, repeat — but the argument buried in it landed: the industry has the burnout conversation backwards. Wellness apps and mandatory meditation breaks treat fatigue as a personal failing. It isn’t. It’s the predictable output of an operating model that assumes infinite human elasticity. And that model is about to be tested harder than it ever has been.

The data backs the framing. A Sophos survey of 5,000 IT and cybersecurity professionals across 17 countries, conducted in Q1 2025 and published as The Human Cost of Vigilance, found that 76% reported experiencing cyber fatigue or burnout constantly, frequently, or occasionally. Sixty-nine percent said the problem worsened between 2023 and 2024. Not plateaued — worsened. Thirty-nine percent reported that burnout reduced their productivity; 33% said it reduced engagement. Respondents cited an average of three separate contributing factors, which means the stressors are stacking, not isolated.

The Patch Queue Is the Denominator

The Patch Tuesday grind is the most visible expression of a deeper math problem. CVE submissions to the National Vulnerability Database increased 263% between 2020 and 2025, and Q1 2026 is running nearly a third higher than Q1 2025. NIST enriched nearly 42,000 CVEs in 2025 — a record — and still couldn’t keep pace. More than 100,000 CVEs in the NVD currently sit in “Not Scheduled” status for enrichment. The agency has responded by prioritizing only CISA’s Known Exploited Vulnerabilities list, federal software, and critical infrastructure, explicitly deprioritizing the long tail.

For a practitioner at a mid-size organization, that long tail is their reality. Every Patch Tuesday, they are triaging a backlog that grows faster than it shrinks. The question isn’t whether to patch everything — that was never realistic — it’s how to make defensible decisions about what to defer, and to whom, under what accountability structure. Most organizations have not built that structure. They have built an on-call rotation and a ticket queue.

AI Makes the Queue Longer Before It Makes It Shorter

The commonly offered corrective is automation: AI-assisted patch management will compress remediation timelines and take the load off human analysts. This is probably true in the medium term for organizations with mature tooling and clean asset inventories. In the near term, the threat vector is running ahead of the defensive tooling.

Frontier AI models are collapsing the time between vulnerability discovery and weaponization from days toward hours. Unit 42 describes exploitation windows shifting from “N-days” to “N-hours.” Anthropic has noted that the cost, effort, and expertise required to find and exploit vulnerabilities have dropped sharply. Google’s Project Zero used an AI agent to locate an exploitable SQLite memory-safety vulnerability before the official release — the first documented case of an AI independently finding a novel, exploitable bug in widely deployed software.

The asymmetry here is structural. Attackers need one viable path. Defenders must secure all paths. When AI cuts attacker preparation costs while defensive workflows still require validation, change-control approval, and regression testing, the gap between disclosure and exploitation narrows faster than remediation cycles can follow.

More CVEs. Shorter exploitation windows. No proportional increase in analyst headcount. The burnout math is not hard.

Why Wellness Framing Fails

The wellness-app response to burnout is not malicious — it’s category error. Meditation breaks improve individual wellbeing for people experiencing manageable stress. They do not change the number of CVEs that land on a Tuesday morning, the SLA that requires a critical patch within 72 hours, or the understaffing that means one person owns the queue.

The Sophos data makes this plain. Forty-eight percent of respondents said they feel exhausted trying to stay current on threats and emerging technology. Forty-seven percent reported feeling overwhelmed by workload. Those are structural complaints. They describe a job that expanded faster than the role was resourced to absorb it.

The feedback loop makes this worse over time. Understaffed teams burn out. Burned-out practitioners leave. Attrition widens the gap. The remaining staff absorb more load. This is not a hypothesis — ISC2’s workforce research documents the shortage growing even as certifications and programs proliferate, because the inflow of new practitioners cannot keep pace with the attrition pressure at the top.

What Structural Fixes Actually Look Like

None of this means individuals are helpless. The practitioners who get out of the spiral tend to do a few specific things. They move from CVSS-score-based patch prioritization to EPSS-weighted models that focus effort where active attacker interest actually exists — teams that have made this shift report reducing effective remediation workload by 60 to 80 percent. They build explicit escalation and deferral policies before the crisis, so the 2 a.m. decision about whether to emergency-patch is made by a documented process rather than by whoever is awake. They get explicit with leadership about the relationship between staffing levels and risk posture.

At the organizational level, the argument is simpler: treat the security operations function as a capacity-limited resource, not an elastic one. If the CVE queue is growing faster than the team can absorb, that is a resource allocation signal, not a motivation problem.

The thread on Reddit put it plainly: the operating model assumes infinite human elasticity. It doesn’t exist. Until that assumption changes, the wellness app goes straight to the bottom of the stack.


Sources

Sources

  1. The Human Cost of Vigilance: Addressing Cybersecurity Burnout in 2025 (Sophos)
  2. AI Vulnerability Research Is Collapsing the Patch Window (Penligent)
  3. NIST CVE Prioritization as AI Speeds Up Vulnerability Discovery (Penligent)

Subscribe

Cybersecurity news, daily — breaches, CVEs, ransomware, threat actors, and the patches that matter. — delivered when there's something worth your inbox.

No spam. Unsubscribe anytime.