We calculated how much time teams waste triaging security false positives. The number is insane.
嗯,用户让我总结一篇文章,控制在100字以内,而且不需要特定的开头。我先看看文章内容。文章主要讲开发团队在构建安全工具时遇到了安全警报疲劳的问题。他们发现漏洞扫描器产生大量警报,工程师们花了很多时间处理,结果发现很多其实不重要。 文章里提到他们量化了这个问题,计算出一个中型团队每月可能花费850小时处理这些警报,相当于每月8.5万美元,一年就是100万美元。他们还做了一个计算器来估算不同团队的情况,并公开了这个工具。 用户的需求是用中文总结,所以我要抓住关键点:安全警报疲劳、时间浪费、成本高昂、解决方案是计算器。确保不超过100字,同时表达清晰。 可能的结构是:开发团队发现安全警报导致时间和金钱浪费,创建计算器来估算影响,并公开工具。 再检查一下字数,确保符合要求。 </think> 开发团队发现安全警报疲劳导致工程师浪费大量时间和资源。通过量化分析,中型团队每月可能花费850小时处理无用警报,每年浪费约100万美元。为解决此问题,团队创建了一个计算器来估算不同规模团队的损失,并公开了该工具以帮助其他开发者。 2026-3-11 16:57:57 Author: www.reddit.com(查看原文) 阅读量:2 收藏

When we were building security tooling we started digging into a problem most dev teams complain about:

Security alert fatigue.

Most vulnerability scanners produce huge volumes of alerts, and engineers end up spending a lot of time figuring out which ones actually matter.

So we tried to quantify it.

Based on industry averages:

  • ~10 minutes spent triaging each alert

  • dozens of scans per month

  • multiple engineers involved in the process

For a mid-sized engineering team the numbers start looking pretty wild.

For example:

A team of 30 engineers running ~50 security scans per month could spend roughly:

• 850 hours per month dealing with vulnerability noise
• $85k/month in engineering time
• ~$1M/year in wasted effort

We ended up building a small calculator to estimate this for different team sizes.

You can try it here if you're curious:
https://kolega.dev/noise-tax-calculator

It was originally something we built internally while working on automated remediation tooling, but the numbers were interesting enough that we decided to publish it.

Curious what people's experience has been with vulnerability alert fatigue.

  • Do your scanners produce lots of false positives?

  • Or has tooling improved recently?


文章来源: https://www.reddit.com/r/blackhat/comments/1rqzcwk/we_calculated_how_much_time_teams_waste_triaging/
如有侵权请联系:admin#unsafe.sh