<p>Look into our cybersecurity crystal ball for the rest of 2026, and you probably won’t be surprised to see a familiar acronym appear: AI.</p>
<p>What’s new this year is that — three years after ChatGPT first burst into public consciousness — CISOs are now getting down to the nitty-gritty of <a href=”https://www.techtarget.com/searchsecurity/feature/AI-powered-attacks-What-CISOSs-need-to-know-now”>AI threats</a> and opportunities like never before. High-level concerns about AI supply chain risk have given way to granular discussions of audit-ready AI activity logs, software-bill-of-materials (SBOM)-style model attestation and Model Context Protocol (MCP) server security. Additionally, mostly theoretical musings on AI agents’ potential to transform the security operations center (SOC) have now become practical conversations about breaking defensive tasks into agentic workloads.</p>
<p>You’ll find all of this and more in the following collection of 2026 cybersecurity predictions, as shared with SearchSecurity by your fellow industry leaders.</p>
<section class=”section main-article-chapter” data-menu-title=”1. AI-enabled social engineering campaigns will escalate”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>1. AI-enabled social engineering campaigns will escalate</h2>
<p>Think that’s your boss on Zoom? Think again. Many experts predict 2026 will be the year that typical enterprise users learn — some the hard way — that they can no longer trust their own eyes and ears.</p>
<p>”We’re poised to see a new phase of cyber-risk in 2026,” warned Andy Ulrich, CISO at Vonage, part of Ericsson. That’s because attackers are using generative AI and <a href=”https://www.techtarget.com/searchsecurity/tip/Prepare-for-deepfake-phishing-attacks-in-the-enterprise”>deepfakes to launch increasingly convincing phishing attacks</a> at scale, regardless of native language and social engineering skills.</p>
<p>Enterprises, Ulrich added, must double down on training users to approach every digital interaction — even with trusted colleagues — with healthy skepticism. At Vonage, for example, he has already begun including <a href=”https://www.techtarget.com/searchsecurity/tip/Real-world-AI-voice-cloning-attack-A-red-teaming-case-study”>AI-enabled social engineering scenarios</a> in security awareness training to demonstrat
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: