Cookie Preferences
By clicking, you agree to store cookies on your device to enhance navigation, analyze usage, and support marketing.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

It’s the end of 2025 and, as every year, we see plenty of articles and newsletters aiming to share the big news of what security changes to expect in 2026 with dramatic forecasts such as “hyper-risk”, “catastrophic attack waves” and “next-gen cyber storms” (just to pick our three favourite ones). From our experience, these forecasts are not incorrect since the financial damages from cyber attacks are increasing every year, but what remains is that companies which do their homework well can take control and build an efficient security programme that reduces risks sustainably.
The landscape will keep evolving, and most of the movement has been visible already for years and will continue. Below we summarise the developments that we see increasing day to day and that will continue to shape our security work next year.
AI is everywhere: in daily work, in the media, and it should be embedded in every security roadmap. AI-powered security tools are now standard features, attackers use AI to scale reconnaissance and social engineering, and every company needs AI security governance. The opportunity for efficiency is real, and so are the risks of data leakage, model abuse and third-party exposure. With this impact in mind, AI-based security trends are the first ones we highlight.
Mainstream tools integrate AI for detection and response. Governance expectations rise across legal, compliance and customers. Attackers improve the speed and quality of phishing, business email compromise and credential harvesting with automated content.
Uncontrolled AI use can expose sensitive data or create compliance issues, while well-governed adoption reduces analyst overhead and improves time to detect and respond. The balance is intentional enablement, not bans or a free-for-all.
I remember a speech I gave at it-sa back in 2023 about Zero Trust moving from initial hype to an overused buzzword. Zero Trust both redefined foundational security practices and, at the same time, challenged organizations to adopt them in a practical way. In 2026 it is no longer a buzzword, it’s just accepted as the new normal. It is the baseline for best-practice architectures and strategies. Principles such as explicit verification, healthy devices, least privilege and segmentation around what matters drive security across SMEs and large enterprises, whether they call it Zero Trust or not.
Tooling and infrastructure become more Zero Trust-ready as leading providers build the principles in by default, from identity and endpoint management to monitoring. Culturally, security teams keep applying Zero Trust in day-to-day decisions, while broader mindset adoption across business teams such as HR, operations and development remains a work in progress.
The reason Zero Trust matters has not changed. Compromised credentials and unmanaged endpoints remain among the most common entry paths. Zero Trust reduces blast radius, enables a modern workforce across locations and devices, and improves operational processes by driving consistent, policy-based decisions.
Insurers are getting pickier. They want to see real security in place, not just a nice policy on paper. Questionnaires go deeper, follow-up questions are sharper, and they increasingly ask for proof instead of accepting a simple yes. At the same time, premiums and deductibles are climbing, and it is becoming more common to see tighter wording or exclusions around large, widespread incidents or very old, unsupported systems. A cyber policy can soften the financial hit when something goes wrong, but it does not replace basic security work.
Insurers now look much more closely at how your controls work in practice. They care about whether MFA is in place for important accounts and remote access, whether EDR actually runs on servers and endpoints, how you handle privileged accounts, whether backups are immutable or offline, and whether you run and document incident response exercises rather than leaving them in a slide deck.
How insurable you are, and what you pay, depends more and more on the real maturity of your controls, not on what is written in a policy document. Gaps tend to show up as higher premiums, higher retentions, or limits and exclusions in the wording. Strong, well-documented controls can speed up renewals and help you get better terms.
Operational Technology sits at the heart of safety and uptime. For a long time, OT lived in its own world with very limited visibility. That silo is hard to justify today. Production lines, building automation and plants are too connected, and they depend on basic cyber hygiene and clear rules for how they talk to IT systems.
Cyber attacks increasingly hit systems that control physical processes, not just office IT. That includes classic OT in plants and production, and IoT devices in buildings and logistics. Ransomware, remote-access abuse and misconfigurations can now have real-world impact, from stopped lines to building failures. As connectivity grows, these attacks become more likely, not less.
If OT goes down, the business goes down with it. Blind spots in plants quickly become safety issues and revenue risk. Auditors and customers increasingly expect proof that you know what runs in your environment and how you bring it back if something goes wrong.

Regulatory expectations are getting clearer and more concrete. For organizations that have ignored the basics, the next years can mean heavy lifting, especially around topics such as asset visibility, patch discipline, secure development with SBOMs and AI governance. Teams that have kept a reasonable level of hygiene might still feel some pressure, but they will not see anything completely out of nowhere. The focus is shifting from having plans to being able to prove what you actually do.
Regulators and industry bodies publish more specific rules, guidance and audit criteria. Boards get clearer accountability, and procurement teams ask for stronger evidence. That can include SBOMs, secure development checkpoints and basic AI risk documentation for systems that matter.
If your security fundamentals are weak, compliance turns into a disruptive and expensive project that competes with everything else you want to build. If the fundamentals are there, the main task is to show reliability with evidence and to weave compliance checks into normal development and operations rather than bolting them on from the outside.
Most so-called predictions for 2026 are trends that have been emerging since 2024 or earlier. If your organization follows a strategy of continuous improvement aligned to modern, long-term business requirements, we do not see a major game changer that should keep you awake at night. On the other hand, organizations that have aimed for the bare minimum until a severe cyber attack hits, an audit is failed or too many customer opportunities are lost will see risk increase in 2026 and for the foreseeable future.
One article cannot cover every trend, but the list above outlines the main drivers. While the post-quantum era is another core topic that is widely discussed, we do not see tangible progress that lets us predict clear security-relevant changes for 2026 with confidence. That can change quickly.
How do I know if NIS2 applies to my company and whether we are “essential” or “important”?
What are the first steps to prepare for NIS2, CRA, and the AI Act without creating three separate projects?
Do I need an SBOM in 2026?
Which AI security risks should I include in my threat model?
How is AI changing attacker and defender capabilities in 2026

A practical look at the key cybersecurity developments shaping 2026, including AI security, Zero Trust, cyber insurance, OT risk, and evolving EU regulations.
Read More