Loading...

10 Mar 2026 21:54

Editor's Pick Recommended for You Tech & Start Up

Palo Alto Networks CSO predictions for 2024

Prediction 1: AI Makes the CISO’s Landscape More Challenging

Business and IT departments will struggle to define true ownership of AI. Meanwhile, cybersecurity best practices around AI will be left behind, and attackers will leverage Large Language Models (LLMs) and Generative AI to significantly improve spear phishing emails, combining them with deepfake and other AI-enabled attacks to increase click rates.

Call to Action

CISOs need to focus on facilitating and communicating risk for AI-enabled projects to the business. They should prioritise projects that support the highest-value capabilities and where cybersecurity has the most business impact.

CISOs will need to leverage AI-enabled platforms to decrease complexity and increase security efficacy while learning from their peers about AI-security best practices.

Prediction 2: Generative AI Accelerates Cybersecurity as an Enabler

As Generative AI models mature through 2024, the rise of Security Copilots will increase Security Operations (SecOps) productivity. This significantly changes the focus within the team towards a proactive vs. reactive mindset, with a greater focus on building threat intelligence platforms that leverage AI as early-warning systems. In addition, a greater focus on threat-hunting programs will provide better visibility to attack surfaces before security teams embark on digital-first projects.

Call to Action

The CISO role will evolve towards a Chief AI Security Officer (CAISO), using AI models to help predict threats proactively via real-time and autonomous systems.
This evolution of the CISO role will have a unique opportunity to bring business leaders together and use cybersecurity as the key foundation to confidently build AI-enabled digital projects.

Defining metrics that can be tracked, such as incident resolution and AI protection against data poisoning or degradation, will increase significantly.

Prediction 3: Consolidation with Platformisation Will Significantly Improve Security Outcomes

As a top business priority for 2024, cybersecurity consolidation promises decreased cost and complexity but not increased cyber efficacy. Businesses will learn that consolidation does not equal platformisation, and projects focused on cost efficiency without a focus on optimisation and better security outcomes will fall short.

Call to Action

Security teams need to deliver modular systematic platformisation as a differentiator for the business, significantly reducing vendors from over 30+ down to 2-3 trusted cybersecurity partners working within an ecosystem.

Businesses should leverage an innovative cyber partner that can help consolidate but also focus on real-time and autonomous security outcomes while improving simplicity and integration.

Prediction 4: Regulators’ Resources Under Pressure

NIS2 and DORA bring increased requirements across more organisations compared to NIS.

The requirements bring a risk of misinterpretation and incomplete information delivered, which leads to a lack of resources for authorities to prioritise and qualify cases. The result will be fewer resources for support, education, and reaction.

Call to Action

Both authorities and organisations will need to leverage technology to proactively understand the severity and potential impact of new requirements rather than assess reactively during a time of crisis.

It’s essential authorities and organisations build programs founded on technologies for attack surface management, proactive threat briefings and assessments, as well as leverage incident response retainers with a reputable security organisation.

Authorities will need to have a threat-informed approach to cybersecurity to qualify reports.

Prediction 5: Boards Get on Board with Cybersecurity

New regulations such as NIS2 require greater accountability by board members towards cybersecurity. As a result, organisations will add more experts or former CISOs to their boards and create dedicated cybersecurity committees to combat the growing scrutiny by regulators. Willingness to up-skill cybersecurity knowledge will be a key driver for fostering CISO/Board trust.

Call to Action

Build a governance framework for cyber resilience sponsored by the board.

Schedule regular annual board briefings and include your ecosystem partners (e.g. strategic vendors, customers and/or suppliers), and run board advisory services and tabletop exercises.

Prediction 6: Organisations Begin to Assess Their Infrastructure for Quantum Readiness

At least 50% of organisations across critical infrastructures, such as financial services or national security, will launch projects to assess the impact of emerging quantum computing on their cybersecurity posture.

Call to Action

Assess the risk to your organisation of threat actors who can eavesdrop, capture encrypted communication and store it away to decrypt later when quantum computers become widely available.

Map self-developed applications and vendor technologies where Post Quantum Cryptography (PQC) will become necessary immediately or in 2025.

Prediction 7: Organisations Align Security Closely to the Software Development Pipeline, So Security Is Built at the Same Speed that Applications Are Engineered

The proliferation of Generative AI applied to software engineering will lead to a spike of buggy self-developed software as well as accelerated attacks against those applications. Paired with the increasing risk of supply chain attacks and an explosion of open source usage, at least 30% of enterprises will prioritise application security as their top 3 cyber risk in 2024.

Call to Action

Assess your security posture in, of, and around the software engineering pipeline and build a plan to run security at the speed of engineering.
Strategise security measures according to Developer Experience (DevEx), such as frictionless integration into the developer ecosystem, context between code-build-run, controls-as-code and high automation, using infrastructure-as-code security tools.

(Visited 230 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETkincir88ABC1131ABC1131 LOGINaws korelasi parameter mahjong waysaws teori permainan mahjong ways3aws manajemen risiko gates olympusaws breakdown volatilitas mahjong winsaws model stokastik sweet bonanzaaws tren rtp intensitas scatteraws metode analisis mahjong winsaws pemantauan rtp live pgsoftaws fase tenang mahjong waysaws wild emas olympus multiplieraws evaluasi sesi mahjong waysaws grid terbuka reaksi berantaiaws diskusi komunitas mahjong waysaws jadwal bermain mahjong waysaws tren digital mahjong waysaws sinkronisasi reel mahjong waysaws perilaku pemain mahjong winsaws atmosfer malam mahjong wayscara menguak teknik cerdas mahjong wild deluxe dadu sicbo gates of olympus perihoki paling barutatktik analisa pola dan strategi terapan mahjong ways 2 pgsoft baccarat starlight princess perihokipanduan mudah teknik peluang dan analisa mahjong wins 3 pragmatic blackjack sweet bonanza perihokimenyingkap tabir teknik peluang dan rtp live roulette mahjong ways 2 pgsoft wild west gold perihokikombinasi unik gunakan pola dan analisa cerdas mahjong wins 3 pragmatic blackjack sugar rush sv388 perihokipola strategi terbaik untuk menang mahjong wild deluxe dadu sicbo gates of olympus duta76tata cara menguasai teknik dan strategi menang mahjong ways 2 pgsoft starlight princess duta76taktik paling unggul dan pola rahasia mahjong wins 3 pragmatic blackjack sweet bonanza duta76peta peluang strategi terapan duta76 main mahjong ways 2 pgsof roulette wild west gold roulette duta76eksperimen lengkap teknik serta taktik menang mahjong wins 3 sugar rush blackjack duta76persistensi sesi walk of shame indikator stabilakselerasi mahjong princess teknologi cloudsimulasi probabilistik roma fastspin distribusi hasilintegrasi perencanaan sesi golden horse ridelogika pola dragon ball 63 jutaaws pola rtp konsistensi sesiaws momentum rtp live mahjongaws dc off turbo aztecaws momentum scatter wild rtpaws strategi algoritma rtp mahjongaws jackpot progresif mahjong waysaws siklus rtp mahjong winsaws fluktuasi rtp scatter hitamaws observasi rtp scatter hitamaws analisis rtp wild bountyaws kontrol optimal sweet bonanzaaws risiko modal kaskade bonanzaaws update rtp live harianaws rtp live permainan ramaiaws ritme visual mahjong winsaws ritme spin mahjong winsaws rotasi dinamis mahjong winsaws pola andalan mahjong waysaws transisi kecepatan mahjong winsaws sesi tenang mahjong waysaws analisis mahjong jam efektifaws analisis pola frekuensi mahjong waysaws eksplorasi mahjong ways bonusaws evaluasi fase sweet bonanzaaws inovasi platform pgsoft rtpaws jalur multiplier mahjong bonanzaaws kerangka strategi rasional lucky nekoaws observasi baccarat ritme malamaws observasi wild mahjong malamaws panduan membaca roadmap rtp liveaws perencanaan distribusi modal mahjong winsaws perencanaan laju mahjong sistemaws rekonfigurasi analisis bonus mahjong waysaws rotasi mahjong eskalasi intensitasaws strategi finansial mahjong wins 3aws strategi lengkap bermain mahjong winsaws strategi presisi fluktuasi rtp pg softaws teknik strategi mahjong wins 3aws teori permainan mahjong ways 2aws transformasi digital rtp pg softmanual algoritma glory of rome 95 persenmanajemen sesi mahjong ways 3 ramadan 2026formula great rhino megaways 97 persensinergi tata kelola modal aztec gemsinvestigasi gpu cloud madame destiny responsifsinkronisasi durasi sesi 5 lions megawaysprotokol algoritma thor megaways 48 jutaskema efektivitas bigger bass bonanza 16 jutaobservasi pola jokers jewels tingkat keberhasilankonsistensi pola dragon hatch 17 juta Top