Like many people in their mid-twenties, the Common Vulnerabilities and Exposures (CVE) program, a cornerstone of the cybersecurity industry, is having a quarter-life crisis. At RSAC 2026, CVE board members voiced their concerns about the longevity of the 26-year-old vulnerability catalog program, which is sponsored by CISA and managed by the MITRE Corporation, as it faces financial and administrative hurdles. Uphill battle. Katie Noble, director of product security incident response team (PSIRT) and bug bounty at Intel, told the audience that funding remains a large issue for the CVE program, along with the “human glue” holding it together. Last April, the cybersecurity industry erupted when federal funding for the CVE program almost expired; after that, CISA extended its contract for another 11 months. “The board, we’ve tried for years to highlight issues, and sometimes they get through and sometimes they don’t,” Noble said. “I don’t think that we can afford to continue at the pace with the tools that we currently have in order to make real progress. I think we’re just going to be left in the dust.” The program faces bureaucratic and financial hurdles.—BM |