This copyrighted article discusses how frontier AI systems are reducing the time available for defenders to identify and patch vulnerabilities before they can be exploited. The piece outlines implications for cybersecurity strategies and recommends defensive adaptations to counter the accelerated threat timeline.