Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    In 2026, collaboration, honesty and humility in cyber are key

    UK government pledges to rewrite Computer Misuse Act

    NCSC and BT block a billion dangerous clicks

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025

      From Steve Bannon to Elizabeth Warren, backlash erupts over push to block states from regulating AI

      November 23, 2025

      Insurance companies are trying to avoid big payouts by making AI safer

      November 19, 2025
    • Business

      Public GitLab repositories exposed more than 17,000 secrets

      November 29, 2025

      ASUS warns of new critical auth bypass flaw in AiCloud routers

      November 28, 2025

      Windows 11 gets new Cloud Rebuild, Point-in-Time Restore tools

      November 18, 2025

      Government faces questions about why US AWS outage disrupted UK tax office and banking firms

      October 23, 2025

      Amazon’s AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offline

      October 21, 2025
    • Crypto

      Most Bitcoin On-Chain Indicators Signal a New Bear Market Cycle

      December 3, 2025

      Why the Latest Binance Lawsuit Is More Dangerous Than Any Regulator

      December 3, 2025

      Could the Fusaka Upgrade Light the Fuse for a Pectra-Like 56% Ethereum Price Rally?

      December 3, 2025

      Bitcoin Mining Hit Its Breaking Point — Now AI Is Taking Over Its Racks | US Crypto News

      December 3, 2025

      XRP Jumps 8% as Crypto Whales Scoop Up $1.3 Billion 

      December 3, 2025
    • Technology

      In 2026, collaboration, honesty and humility in cyber are key

      December 3, 2025

      UK government pledges to rewrite Computer Misuse Act

      December 3, 2025

      NCSC and BT block a billion dangerous clicks

      December 3, 2025

      UK national security strategy failing to account for online world

      December 3, 2025

      Your ‘dear algo’ Threads posts might actually do something soon

      December 3, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»In 2026, collaboration, honesty and humility in cyber are key
    Technology

    In 2026, collaboration, honesty and humility in cyber are key

    TechAiVerseBy TechAiVerseDecember 3, 2025No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    In 2026, collaboration, honesty and humility in cyber are key
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    In 2026, collaboration, honesty and humility in cyber are key

    As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.

    By

    • Rik Ferguson, Forescout

    Published: 03 Dec 2025

    If 2024 was the year AI crashed into cyber security, 2025 was the year interdependence became impossible to ignore.

    Looking back over the past 12 months, the most important lesson I’ve learned is an uncomfortable one for security people: you are not really “in control” of your risk, you are sharing it. You are sharing it with suppliers, with operators, with cloud and AI platforms, and with the people on your own teams whose resilience is being stretched.

    In our research at Forescout we’ve watched attacks continue to climb sharply. Across multiple reports, we’ve seen total attack volumes more than double compared with last year, and incidents in critical infrastructure grow several-fold. In the first half of 2025 alone, we tracked thousands of ransomware events worldwide, with services, manufacturing, technology, retail and healthcare consistently among the most-targeted sectors. This is no longer an IT hygiene problem; it has become a continuity problem for the real economy.

    Operational technology has moved from the footnotes to the main story. Our threat intelligence work on critical infrastructure and state-aligned hacktivism has documented repeated attempts to disrupt water utilities, healthcare providers, energy companies and manufacturers by going after the industrial systems that run them. In parallel, our Riskiest Connected Devices research shows routers and other network equipment overtaking traditional endpoints as the riskiest assets in many environments, and risk concentrated in sectors that blend IT, operational tech (OT), the Internet of Things (IoT) and sometimes medical devices. The systems that keep things moving, and the devices that quietly connect them, are now prime targets.

    The same interdependence is obvious when you look at the devices and components everyone depends on. In that same Riskiest Connected Devices report, we saw average device risk rise by 15% year-on-year, with routers alone accounting for more than half of the devices carrying the most dangerous vulnerabilities, and risk clustered in retail, financial services, government, healthcare and manufacturing. At the same time, our router and OT/IoT vulnerability research has shown how a single family of widely deployed network or industrial devices with remotely exploitable flaws can simultaneously expose hospitals, factories, power generators and government offices. That is not a theoretical ecosystem risk; it is a design feature of how we now build technology and deliver services. When one link is weak, the consequences propagate.

    Working with organisations through real incidents this year, one pattern keeps emerging: resilience has become an ecosystem property. You can have well-managed endpoints, a competent SOC and a decent incident-response playbook and still be taken down because a third-party supplier gets hit, a “non-critical” OT asset becomes a bridge into IT (or vice-versa), or the humans running your programme are simply exhausted. Burnout is increasingly recognised as a security risk, not just an HR issue.

    So, what does that mean for 2026?

    One trend I expect to crystallise is what I have called “reverse ransom”. Traditionally, extortion follows the organisation that has been breached. We think attackers will increasingly flip that logic: compromise a smaller upstream manufacturer, logistics firm or service provider where defences are weaker, then apply pressure to the larger downstream brands and operators who depend on them to keep the whole chain moving. The party that can pay will no longer always be the party that was breached. For defenders, that means treating supplier visibility, shared detection and joint exercising as a core competency, rather than paperwork for procurement.

    The second shift is around AI and social engineering. The novelty of AI-written phishing and voice cloning will wear off; it will just be how social engineering is done. In our 2026 predictions, we talk about “social engineering-as-a-service”: turnkey infrastructure, scripts, cloned voices, convincing pretexts and even real human operators available to anyone with a bitcoin wallet. At the same time, I expect to see more serious, less hype-driven adoption of AI on the defensive side: correlating weak signals across IT, OT, cloud and identity, mapping and prioritising assets and exposures continuously, and reducing the cognitive load on analysts by automating triage. Done properly, that is not about replacing people; it is about giving them back the headspace to think and to delve into the more rewarding stuff.

    The third trend is regulatory. Between NIS2 in Europe, evolving resilience requirements in the UK and similar moves elsewhere, boards are going to discover that ecosystem security is becoming a legal duty as much as an operational one. Regulators are increasingly interested in how you manage third-party risk, how you protect critical processes, and how you evidence that your controls actually work under stress.

    If 2025 taught me that complete control is largely an illusion, my hope for 2026 is that we respond with humility and collaboration rather than fear. That means investing in continuous visibility across IT, OT, IoT and cloud, building genuine partnerships with suppliers and peers rather than throwing questionnaires over the fence, and better considering the wellbeing of the people we rely on to make good decisions under pressure.

    We’re never going back to a simpler threat landscape. But we can build a more honest one that acknowledges interdependence, designs for it and shares the load more intelligently.

    Rik Ferguson is vice president of security intelligence at Forescout, as well as a special advisor to Europol and co-founder of the Respect in Security initiative. A seasoned cyber pro and well-known industry commentator, this is Ferguson’s first contribution to the CW Security Think Tank.

    Read more on Hackers and cybercrime prevention


    • How to sell: OT services and support

      By: Simon Quicke


    • Supply chains are the overlooked risk in industrial cybersecurity

      By: Brian McKenna


    • Cyberattacks against mobile devices climb 224% in healthcare

      By: Jill McKeon


    • Ericsson claims first enterprise 5G agentic AI agent

      By: Joe O’Halloran

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleUK government pledges to rewrite Computer Misuse Act
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    UK government pledges to rewrite Computer Misuse Act

    December 3, 2025

    NCSC and BT block a billion dangerous clicks

    December 3, 2025

    UK national security strategy failing to account for online world

    December 3, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025471 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025160 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202584 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202563 Views
    Don't Miss
    Technology December 3, 2025

    In 2026, collaboration, honesty and humility in cyber are key

    In 2026, collaboration, honesty and humility in cyber are key As we prepare to close…

    UK government pledges to rewrite Computer Misuse Act

    NCSC and BT block a billion dangerous clicks

    UK national security strategy failing to account for online world

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    In 2026, collaboration, honesty and humility in cyber are key

    December 3, 20250 Views

    UK government pledges to rewrite Computer Misuse Act

    December 3, 20250 Views

    NCSC and BT block a billion dangerous clicks

    December 3, 20250 Views
    Most Popular

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    Volkswagen’s cheapest EV ever is the first to use Rivian software

    March 12, 20250 Views

    Startup studio Hexa acquires majority stake in Veevart, a vertical SaaS platform for museums

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.