Contact company icon Add as a preferred source Download PDF version
Summary is AI-generated, newsdesk-reviewed
  • AI-driven threats, regulatory pressures to reshape security in 2026, says WatchGuard.
  • Crypto-ransomware declines as data theft, extortion take centre stage in cybercrime.
  • AI expertise crucial for cybersecurity; defenders must match attackers' automated strategies.

WatchGuard has announced its key cybersecurity predictions for 2026, highlighting the influence of AI-driven threats, evolving regulations, and a shift away from obsolete security tools.

Corey Nachreiner, WatchGuard Technologies' Chief Security Officer, stresses the need for organisations to swiftly adapt to changing threat landscapes and defence mechanisms.

Crypto-ransomware to become obsolete

Enhanced data backup and restoration strategies are making it less likely for organisations

By 2026, it is expected that crypto-ransomware will become outdated as cybercriminals pivot towards data theft and extortion. Enhanced data backup and restoration strategies are making it less likely for organisations to capitulate to traditional ransomware attacks.

Consequently, attackers are increasingly resorting to data theft, threatening leaks, and even reporting victims to regulatory bodies or insurance providers to escalate pressure. The profitability of data exposure now outweighs that of encryption.

AI to bolster defence against supply chain attacks

Open-source package repositories, which have been targeted by a surge of attacks, are under significant pressure. In response, these repositories will initiate AI-based defences to tackle supply chain threats in 2026.

By integrating automated SOC-style systems, repositories can detect and respond to attacks in real-time, meeting the persistent challenge posed by supply chain vulnerabilities.

Impact of the EU Cyber Resilience Act (CRA)

The EU Cyber Resilience Act, set to take effect in September 2026, will drive the adoption of secure-by-design

The EU Cyber Resilience Act, set to take effect in September 2026, will drive the adoption of secure-by-design principles. Software vendors in the EU will be required to report exploited vulnerabilities and security incidents within 24 hours, acting as a catalyst for incorporating security features from the outset.

Despite an initial period of adjustment, this regulation is expected to create a sustainable shift towards more robust security practices, while also navigating the complexities of overlapping global regulations.

AI-driven cyber breaches expected

2026 is anticipated to witness the first instance of a complete cyber breach executed by autonomous AI tools. This evolution, from AI assisting cybercriminals to independent attacks, involves entire breach processes—from reconnaissance to exfiltration—conducted at machine speed.

This development serves as a crucial alert for cybersecurity professionals, underlining the inevitability of AI-driven defences matching this rapid pace in detecting and countering threats.

Transition from traditional VPNs to ZTNA

ZTNA mitigates risks by providing access based on necessity, reducing potential vulnerabilities

Traditional VPNs and remote access tools are susceptible to attacks due to credential issues and a lack of multi-factor authentication. It is estimated that a third of breaches in 2026 will result from flaws in these legacy systems.

As a countermeasure, Small and Medium-sized Businesses (SMBs) are expected to migrate towards Zero Trust Network Access (ZTNA) technologies. ZTNA mitigates risks by providing access based on necessity, reducing potential vulnerabilities.

Growing importance of AI expertise in cybersecurity

The future of cybersecurity will largely revolve around AI, with attackers increasingly employing automated and adaptive tools. To effectively combat these challenges, cybersecurity professionals must attain mastery over AI technologies.

Proficiency in AI will become essential, with professionals expected to leverage it for automating detection and response, while also foreseeing and addressing new vulnerabilities.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...