The three cyber traits that may outline 2026
We’re staring down the barrel of 2026. In case you suppose the final 12 months have been chaotic, strap in.
The business-as-usual mannequin for safety is lifeless. We’re transferring into an period the place the CISO is both a monetary danger dealer or irrelevant, the place AI doesn’t simply write emails however writes exploits, and the place your proper to privateness is being legislated out of existence.
Right here is my tackle the three traits that may outline the subsequent 12 months.
1. The federated CISO (cease counting bugs)
Let’s be sincere: the CISO 2.0 buzzword from 2020 is stale. In mature organisations, the CISO position has already shifted. We aren’t technical guardians anymore; we’re danger brokers.
By 2026, if you’re nonetheless reporting the variety of vulnerabilities you patched to your board, you’re failing. The profitable CISO is embedded within the revenue and loss (P&L) operate. They communicate the language of the CFO, not the language of the firewall. They don’t ask for price range to ‘repair stuff’; they current funding instances based mostly on earnings in danger.
The Workplace of the CISO
The times of the CISO making an attempt to handle each safety resolution are over. The scope is just too broad. The sensible transfer for 2026 is decentralisation, a Federated Safety Mannequin. You set the guardrails (coverage and platform), however you let your safety champions in engineering, gross sales, and different enterprise features to execute the precise work. You cease being the bottleneck and begin being the auditor.
And also you higher have the emotional intelligence to deal with the warmth. When a ransomware negotiation goes south or your staff is burning out from alerting fatigue, you’ll want to be the calmest individual within the room.
2. The agentic AI explosion
We’ve moved well past massive language fashions (LLMs) that simply ‘chat’. We are actually coping with autonomous brokers that ‘do’. As 2026 arrives, we aren’t writing prompts; we’re governing digital employees able to reasoning and utilizing instruments. In well timed information, it’s best to learn the brand new OWASP Prime 10 for Agentic Functions 2026.
I view this with a mixture of skilled alarm and strategic hope.
The unhealthy information:
The unhealthy guys are transferring sooner. We’re seeing polymorphic assault brokers that don’t simply run scripts; they improvise. They scan for targets, write bespoke exploit code on the fly, and – that is the half that retains me up at night time – then handle the extortion. These brokers can negotiate ransom funds utilizing sentiment evaluation to squeeze the utmost payout from a sufferer and not using a human felony ever touching a keyboard.
The excellent news:
We are able to struggle hearth with hearth. We’re coming into the period of self-healing infrastructure. Defensive brokers that detect an anomaly and repair it – blocking IPs, isolating containers, rewriting guidelines – earlier than a human analyst even opens their laptop computer.
For the CISO, that is how we resolve the info overload. We don’t want extra dashboards. We want digital analyst brokers that audit the environment 24/7 and feed a quantitative danger mannequin.
3. The struggle for the fitting to privateness
Whereas we obsess over AI, a a lot quieter conflict is being misplaced. Governments are dismantling the presumption of privateness.
I’m watching this “sluggish boiling of the frog” with deep concern. It’s not nearly encryption anymore; it’s about the fitting to exist digitally with out displaying your papers.
The border dragnet
Have you ever travelled just lately? The presumption of privateness on the border is gone. It’s turning into regular to give up years of emails and social media historical past simply to enter a rustic. We’re handing over our digital souls to frame brokers as the worth of entry.
The “16+” lure
Take a look at what occurred in Australia just some days in the past. The brand new laws restricts social media to these over 16. It sounds noble, however the logic is flawed. To exclude a minor, you need to confirm everybody. You can not filter out the 15-year-old with out carding the 50-year-old.
The naive resolution – importing passport scans to random web sites – is a privateness catastrophe ready to occur.
The one manner out – the system lifeline
There is just one technical technique to adjust to these legal guidelines with out constructing a surveillance state: Privateness-preserving age verification.
We want a mannequin the place your system – which already is aware of who you’re – generates a cryptographic token (a zero-knowledge proof) that merely tells the web site the person is over 16. The web site will get a ‘Sure’, however by no means your identify. The OS vendor sees a token request, however not which web site you’re visiting.
However let’s be clear concerning the trade-off. We’re successfully asking Apple and Google to grow to be the custodians of our civil liberties, defending us from state overreach.
It’s a unusual world the place I belief Apple greater than I belief the federal government, however right here we’re.

