Bob Zukis is Founder and CEO at Digital Directors Network, and Jesse H. Webb is CISO and SVP at Avalon Healthcare Solutions.
What Corporate Boards Need to Know and Do About Anthropic’s Mythos and Project Glasswing
Anthropic’s announcement of Claude Mythos Preview and Project Glasswing marked an important development in AI-enabled vulnerability discovery and cybersecurity. This advancement releases a powerful frontier AI model through a controlled defensive-security initiative rather than a broad public release. Providing Mythos to strategically and systemically important organizations creates a temporary shift in the balance of power between attackers and defenders.
For corporate boards, the significance is not merely technical. AI-enabled vulnerability discovery may give defenders a temporary tactical advantage, but the real governance question is whether management can convert better visibility, and the ability to see latent risk into prioritized remediation, stronger prevention, and durable cyber resilience.
Anthropic described the stakes this way:
Mythos Preview has already found thousands of high-severity vulnerabilities, including some in every major operating system and web browser. Given the rate of AI progress, it will not be long before such capabilities proliferate, potentially beyond actors who are committed to deploying them safely. The fallout—for economies, public safety, and national security—could be severe. Project Glasswing is an urgent attempt to put these capabilities to work for defensive purposes. [1]
Project Glasswing is a curated and strategic collection of launch partners who will work with Mythos Preview as “part of their defensive security work” to focus on “critical software infrastructure so they can use the model to scan and secure both first-party and open-source systems.” [2]
Glasswing addresses a distributed risk challenge in cybersecurity where one company’s weakness can create risk for many other organizations. This problem lacks a collective security model, but the curated and strategic release of Mythos through Glasswing helps establish collective remediation cooperation as a step towards the universal hardening of key layers of the digital economy before they can be exploited.
Mythos Preview addresses one of the fastest growing risks in cybersecurity. Verizon’s 2025 Data Breach Investigations Report (DBIR) reported that exploitation of system vulnerabilities as an initial access step for attackers grew by 34% in 2025 and accounted for 20% of breaches, only behind credential abuse at 22% as an access vector for attackers. [3]
Before Mythos, this aspect of cybersecurity was a race between vulnerability discovery and exploitation by the “bad guys” and enterprise remediation pace and capacity by the “good guys.” Closing this gap is such a challenging issue that the U.S Cybersecurity & Infrastructure Security Agency (CISA) maintains a Known Exploited Vulnerability catalog (KEV) as a central repository with a goal of making the market for identifying and remediating these vulnerabilities faster and more efficient for all companies. Mythos is a tool that gives defenders an advantage by enabling them to efficiently identify and fix latent risk in the system, at scale.
However corporate boards should oversee Mythos as a strategic shift, not just a technical enhancement.
Cybersecurity oversight should not be treated as a routine extension of financial control oversight, which frequently occurs where audit committees are assigned responsibility for cybersecurity. Cyber risk is not a general enterprise risk, and it should not be governed with the same capabilities and approach used to govern general enterprise risks.
Cyber risk differs from many enterprise risks because it is adversarial, asymmetric, highly systemic in nature, and it possesses different temporal and scale dynamics. Mythos introduces implications for each of these characteristics in a favorable way for defenders if it can be capitalized on. This makes cybersecurity oversight in the boardroom less about governing and managing a static control environment and more about overseeing a real-time active contest where the rules regularly change, between enterprise resilience and adversarial capability, innovation and persistence.
Cyber risk involves an intelligent and active adversary. Attackers do not merely expose existing weakness, they search for it, test it, exploit it, and adapt as defenses change. Mythos gives defenders a tool and better intelligence about the latent risks within their own systems before adversaries can discover and exploit them.
Mythos and its private release also tilt the scales temporarily in the favor of cybersecurity defenses which balances out some of the asymmetric disadvantages that defenders face. Attackers generally hold a long-term tactical advantage over defenders because they can search patiently for a single point of weakness while defenders have to constantly protect every part of the entire complex and dynamic system. Mythos gives defenders the ability to identify and close many of these vulnerabilities faster than they can be exploited.
In cybersecurity, time matters because risk can manifest and propagate across interconnected systems faster than traditional remediation processes. Boards need confidence that management can operate at the pace and scale required to detect, prioritize, escalate, and respond before a technical exposure or incident becomes a material business event; Mythos and AI vulnerability discovery helps with that.
Mythos is an AI innovation that does not change risk but exposes what was already there. Having greater visibility into latent risk within complex digital business systems is a groundbreaking step forward that is a necessary step before cybersecurity systems can transform into highly resilient systems.
Mythos and similar tools have the potential to catalyze systemic transformation and resiliency in cybersecurity. However, this will only happen if organizations build the oversight, prioritization, remediation, and prevention systems that can quickly respond, scale, and leverage what better discovery reveals. Better diagnosis becomes transformative when it helps management strengthen the system that creates, detects, prioritizes, and remediates risk.
Healthcare offers a useful analogy. Better diagnostic capabilities in healthcare increased visibility and understanding into latent health risk. When healthcare gained better diagnostic tools, cancer rates and other disease states appeared to rise as this new degree of transparency discovery revealed previously unidentified risk. This ultimately led to many conditions being found earlier, which accelerated treatments that led to more lives being saved.
However, this did not happen immediately and by itself. Better detection also produced overdiagnosis, overtreatment, patient anxiety, unnecessary procedures, and overloaded clinical systems. Problems that as they were solved, enabled entire healthcare systems to transform. That is a similar opportunity that Mythos can enable in cybersecurity.
The lesson in healthcare was not that too much diagnosis was bad or to stop diagnosing, it was to make diagnosis more useful by leveraging it as a catalyst for creating a more effective and disciplined system of triage, staging, treatment, surveillance, prevention, and measurable improvement—one that ultimately did improve healthcare.
Better vulnerability diagnosis will create and expose remediation bottlenecks, create focus and urgency, and also direct attention to a heightened risk understanding of what’s important and what’s not from this scale of risk identification. CISOs will be forced to prioritize their actions and develop a much more effective, capable, and efficient risk management system that is aligned to business value.
Corporate boards will need to focus their cybersecurity oversight on the strategic transformation of cybersecurity systems, along with the progress being made to address the tactical bottlenecks created because of greater vulnerability identification.
Directors should ask management to show how newly discovered vulnerabilities are validated, ranked, assigned, remediated, monitored, or formally accepted as exceptions. For CISOs, the key issue is whether the organization can prioritize and rapidly act on vulnerabilities that are exposed, exploitable, and tied to critical business systems from those that are not.
For directors, the tactical governance issue is whether remediation capacity is prioritized appropriately, keeping pace with discovery, and in understanding what this level of latent risk transparency is telling them about systemic resiliency. Strategically, directors will gain a greater understanding of how the individual parts of the cybersecurity system work together to sustain a resilient and adaptive defensive capability.
Mythos is not just an AI innovation that can give defenders a head start in identifying latent risk. It is a strategic development that can lead to the systemic strengthening and resilience of cybersecurity systems and cybersecurity governance if organizations take advantage of the window of opportunity they have been given.
The uncomfortable truth is that AI-enabled vulnerability discovery will expose more of the enterprise’s hidden cyber risk than many organizations or boards are prepared for. That visibility will be disruptive, but valuable.
Corporate boards should respond to the Mythos announcement by doing the following:
1. Ensure management maps and understands latent risk: Review and discuss previously unidentified vulnerabilities and their risk mapping to business value implications and approve prioritized remediation plans and timelines.
2. Review vulnerability remediation capacity, expected bottlenecks and reengineering plans: Ensure remediation throughput can keep pace with discovery and risk prioritization is aligned to process improvement plans.
3. Ensure management’s strategic shift from patching to systemic resilience: Ensure management has plans that focus beyond patching at scale to use better vulnerability diagnosis to build long-term cybersecurity system resiliency and preventative transformation.
The companies that benefit the most from the Mythos release will not be those that merely find and patch the largest number of flaws. They will be those that use better diagnosis into durable cyber resilience.
1 “Project Glasswing: Securing critical software for the AI era.” n.d., Anthropic PBC, https://www.anthropic.com/glasswing. (go back)
2 Ibid. (go back)
3 Hylender, C. David, Philippe Langlois, Alex Pinto, Suzanne Widup, Verizon DBIR team, Verizon Threat Research Advisory Center (VTRAC) team, and U.S. Secret Service. 2025. “Verizon 2025 Data Breach Investigations Report.” https://www.verizon.com/business/resources/T21f/reports/2025-dbir-data-breach-investigations-report.pdf. (go back)
Print