{"id":15526,"date":"2026-01-22T07:06:13","date_gmt":"2026-01-22T07:06:13","guid":{"rendered":"https:\/\/newestek.com\/?p=15526"},"modified":"2026-01-22T07:06:13","modified_gmt":"2026-01-22T07:06:13","slug":"73-of-cisos-more-likely-to-consider-ai-enabled-security-solution","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15526","title":{"rendered":"73% of CISOs more likely to consider AI-enabled security solution"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>CISO\u2019s are increasingly turning to AI-enabled security technologies to augment their organizations\u2019 cyber defense and extend the capabilities of their teams.<\/p>\n<p>According to Foundry\u2019s <a href=\"https:\/\/foundryco.com\/research\/security-priorities\/\">latest Security Priorities Study<\/a>, 73% of security decision-makers are now more likely to consider a security solution that uses artificial intelligence, up from 59% the year prior.<\/p>\n<p>CISOs plan to leverage AI in a range of security functions, including malware detection, threat detection, anomaly detection, real-time risk prediction, and audit and compliance. They are also eyeing AI for automating security responses, performing authentication, ensuring data loss prevention, and improving enterprise system visibility.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<figure class=\"wp-block-image size-large\"><\/figure>\n<p class=\"imageCredit\">CSO<\/p>\n<\/div>\n<p>Survey respondents cited AI-enabled benefits such as faster detection of unknown threats, accelerating response times, and automating security tasks to reduce employee workload. The findings are in line with an October 2025 study from management consultancy PwC, which found AI ahead of cloud security and data protection as the <a href=\"https:\/\/www.pwc.com\/gx\/en\/news-room\/press-releases\/2025\/pwc-digital-trust-insights.html\">top cybersecurity investment priority for enterprises over the next 12 months<\/a>.<\/p>\n<p>But cutting through the hype to ensure AI investments have optimal impact remains an issue. Experts quizzed by CSO said that security leaders should prioritize AI investment over the next 12 to 18 months to boost anomaly detection, enhance identity and access management, and automate response, but they should also be aware of potential pitfalls such as hallucinations, over-reliance on AI, and governance gaps when implementing AI in their security strategies.<\/p>\n<h2 class=\"wp-block-heading\" id=\"cutting-through-the-noise\">Cutting through the noise<\/h2>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oliver-newbury-086b01aa\/?originalSubdomain=uk\">Oliver Newbury<\/a>, chief strategy officer at cyber resilience vendor Halcyon and previously CISO at Barclays, tells CSO that the \u201cstrongest uses of AI in security are the ones that improve visibility and reduce noise.\u201d<\/p>\n<p>\u201cTeams need clearer signals, earlier warnings, and quicker routes to certainty in the middle of an unfolding incident,\u201d Newbury says. \u201cAI that can sift large volumes of activity, highlight meaningful patterns, and present them in a way that analysts can act on immediately is where organizations see real benefit.\u201d<\/p>\n<p>Newbury adds: \u201cThese capabilities help shorten investigation time and support faster, confident decision-making during high-pressure situations.\u201d<\/p>\n<p>A human-led approach is no longer sufficient to deal with the increased complexity and volume of threats, many security experts contend. Strategic use of AI technology has the potential to recognize patterns of attack and offer analysts the ability to cut through the noise and make better decisions, freeing up time and resources to deal with higher-value security work and move beyond constant firefighting.<\/p>\n<p>\u201cMost security teams are overloaded, and not because they lack tools, but because they lack time and clear signals,\u201d Newbury says. \u201cAI earns its keep in the areas where speed and pattern recognition genuinely outperform manual effort: behavioral anomaly detection, early-stage threat indicators, and the subtle identity-related activity that often precedes a ransomware event.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"check-against-delivery\">Check against delivery<\/h2>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/david-tyler-outlier\/?originalSubdomain=uk\">David Tyler<\/a>, founder of tech consultancy Outlier Technology, warns that some vendors slap the label \u2018AI\u2019 on existing capabilities while adding a higher price tag combined with solid product development and real advances from others.<\/p>\n<p>\u201cA lot of what\u2019s being sold as breakthrough AI is actually decades-old technology finally being implemented properly; this isn\u2019t necessarily bad, as good product management matters as much as novel algorithms,\u201d Tyler says. \u201cBut if a vendor\u2019s \u2018AI security solution\u2019 appeared overnight in the last couple of years, you\u2019re probably looking at rebranding rather than genuine capability building.\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<figure class=\"wp-block-image size-large\"><\/figure>\n<p class=\"imageCredit\">CSO \/ Foundry<\/p>\n<\/div>\n<p>CSOs should be asking how long the vendor has been investing in these capabilities and what their product evolution looks like, according to Tyler.<\/p>\n<p>\u201cCompanies that have been building graph-based correlation, adaptive baselining, and behavioral analytics for a decade are very different from those who just added an AI chat function to their user interface and called it innovation,\u201d Tyler says.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/andrewbolster\/?originalSubdomain=uk\">Dr. Andrew Bolster<\/a>, senior manager of R&amp;D at application security vendor Black Duck, also warns CISOs about vendors slapping neural networks onto existing tools without fixing underlying data quality issues.<\/p>\n<p>\u201cYour AI-powered authentication system is only as good as your identity data hygiene,\u201d Dr. Bolster says. \u201cYour AI-powered malware detection is only as good as your sample corpus quality and labelling accuracy.\u201d<\/p>\n<p>Dr Bolster adds: \u201cBefore signing contracts for AI security platforms, audit your data governance maturity.\u201d<\/p>\n<p>Bolster also argues that CISOs themselves should focus more on how to build an AI-ready security data platform rather than which security tools they need to buy.<\/p>\n<p>\u201cCISOs should invest in data mesh architectures that treat security telemetry as a first-class data product with defined ownership, quality SLAs [service level agreements], and standardized schemes,\u201d he says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"building-an-ai-security-platform\">Building an AI security platform<\/h2>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/merlingillespie\/?originalSubdomain=uk\">Merlin Gillespie<\/a>, operations director at managed security services provider Cybanetix, sees the AI security market maturing \u2014 and moving away from point solutions that offer reduced operational expenditure toward a more integrated approach. Gillespie warns that this shift creates fresh challenges for security leaders.<\/p>\n<p>\u201cThese days every security tool has a layer of AI \u2018assistance\u2019 but instead of simplifying operations this is creating overlapping tools, inconsistent reporting, and unclear provenance of data,\u201d according to Gillespie. \u201cThe learning is that AI-labelled tools are helpful but aren\u2019t a solution in themselves.\u201d<\/p>\n<p>The exercise most organizations face is classifying which processes are eligible for automation, and which of these are enhanced by the determinism and reasoning of AI, Gillespie advises.<\/p>\n<p>\u201cSecurity teams should apply the same top-down analysis used across their wider business to support software and personnel efficiency, rather than being led by vendor tooling which can result in further siloing,\u201d Gillespie says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"potential-pitfalls\">Potential pitfalls<\/h2>\n<p>Halcyon\u2019s Newbury warned that these issues were far from the only potential pitfalls that come from deploying AI systems. For example, over-reliance on AI systems can lead to greater risk.<\/p>\n<p>\u201cAI shouldn\u2019t replace the fundamentals such as asset management, patching, identity governance, proper segmentation, or tested recovery plans,\u201d Newbury says. \u201cThose disciplines matter even more as attackers adopt AI at speed.\u201d<\/p>\n<p>Issues inherited from the inadequate training of AI systems can also create problems.<\/p>\n<p>\u201cAI systems can easily inherit blind spots if they\u2019re trained on narrow or unrealistic datasets,\u201d he says. \u201cCISOs must understand how models are trained and where their assumptions break down.\u201d<\/p>\n<p>Ransomware remains the clearest test of whether AI investment is being prioritized in the right places, Newbury argues.<\/p>\n<p>\u201cMost modern [ransomware] incidents are effectively identity-based attacks,\u201d Newbury says. \u201cAttackers are logging in rather than \u2018hacking in,\u2019 often armed with credentials harvested at scale by <a href=\"https:\/\/www.csoonline.com\/article\/3951147\/infostealer-malware-poses-potent-threat-despite-recent-takedowns.html\">infostealers<\/a>.\u201d<\/p>\n<p>Newbury adds: \u201cAs adversaries fold AI into their operations, you\u2019ll see more of these attacks landing faster and hitting harder. That makes the resilience question far more urgent.\u201d<\/p>\n<p>Newbury concludes: \u201cAI is worth the investment but only where it sharpens decision-making, reduces noise, and gives teams the time and clarity to act before a problem becomes a crisis.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>CISO\u2019s are increasingly turning to AI-enabled security technologies to augment their organizations\u2019 cyber defense and extend the capabilities of their teams. According to Foundry\u2019s latest Security Priorities Study, 73% of security decision-makers are now more likely to consider a security solution that uses artificial intelligence, up from 59% the year prior. CISOs plan to leverage AI in a range of security functions, including malware detection,&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15526\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15526","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15526"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15526\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}