None
<p><span data-contrast="none">You’d be hard-pressed to find a cybersecurity professional who doesn’t recognize the benefits of AI, or who isn’t using AI. Still, likewise, nearly all companies are moving forward with trepidation, expressing concern about AI Agents’ potential to negatively impact cybersecurity, new research from Darktrace shows.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Almost all (96%) of the 1,500 cybersecurity professionals surveyed for Darktrace’s annual </span><a href="https://www.darktrace.com/resource/the-state-of-ai-cybersecurity-2026" target="_blank" rel="noopener"><b><i><span data-contrast="none">2026 State of AI Cybersecurity Report</span></i></b></a><span data-contrast="none"> understand that AI amps up the speed and efficiency of their work. And 77% have taken the next step, embedding generative AI into their security stacks.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">More than three-quarters (77%) of security professionals reported that generative AI is now embedded in their security stack. And nearly all (92%) say that AI-powered threats are compelling them to make significant upgrades to their defenses, potentially quelling the concerns of more than half of respondents who say they aren’t prepared to defend against those threats. A whopping 87% had acknowledged that AI has improved outcomes for malware.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“Across every industry, from criminal gangs to nation-state actors, attackers are utilizing AI to accelerate their pace and frequency of attacks, increasingly causing defenders to be outmatched like never before,” says Dave Gerry, CEO at Bugcrowd. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">That’s crucial as <a href="https://securityboulevard.com/2025/04/this-caller-does-not-exist-using-ai-to-conduct-vishing-attacks-2/" target="_blank" rel="noopener">attackers use AI to automate attack</a>s, because “they move faster in gaining access and spreading inside the network; defenses built for human response times fail silently,” says Ram Varadarajan, CEO at Acalvo. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“CISOs investing in AI-native security aren’t chasing efficiency,” says Ram Varadarajan, CEO at Acalvo. “They’re closing a fundamental speed gap between attack and defense.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">AI can help by improving vulnerability reporting. “Artificial Intelligence (AI) improves the quality and clarity of vulnerability reporting by the hacking community,” says Kamal Shah, CEO at Prophet Security. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“Researchers are using AI to draft clear guidance based on their findings, while documenting impact for multiple audiences within an organization,” Shah says, with some hackers building “AI agents to capture and annotate screenshots and network requests automatically, providing the necessary evidence that enterprises need to validate their findings.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">The result? Organizations receive “standardized, professional reports that are easier to reproduce and fix, effectively reducing the expensive back-and-forth typical of manual triage,” he says.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Mirroring the current sentiment among cyber defenders across industries, cyber professionals surveyed by Darktrace are really worried about AI Agents, which are particularly daunting since they’re proliferating nearly unchecked. Most (92%) are concerned that the agents will have a negative impact on cybersecurity. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“Security teams are no longer just defending human users; they’re supervising autonomous systems that generate their own integrations. The challenge isn’t only technical, it’s also organizational and cultural,” says Randolph Barr, CISO at Cequence Security. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Instead, they now have to manage “shadow AI” and “shadow APIs,” which, Barr says, introduces “risks far beyond traditional DevOps oversight.” </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Noting that “we are approaching a future where the use of AI agents will outpace the readiness of security measures,” Barr says, “we have seen several advisories over the past year which help highlight the gaps and hopefully drive the industry toward more secure, transparent designs before these tools become deeply embedded in enterprise ecosystems.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Governance and visibility have become the new frontline, he says, explaining that “without unified oversight, a single misconfigured API or orphaned key can compromise entire AI pipelines.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">The way security works is changing. “AI is already reshaping cyber work, and the next 12 months will fast-track that shift. AI agents are reducing demand for some entry-level roles, such as basic alert triage, log review, and first-pass investigations,” says Diana Kelley, CISO at Noma Security. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Because “AI is increasing demand for higher-context roles involving agentic system design, advanced prompt engineering, context-based threat modeling, and human-in-the-loop oversight of agentic systems,” says Kelley, “CISOs see AI changing the mix of skills and roles on their teams, not eliminating security organizations wholesale.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">That doesn’t mean a growing workforce. “Rather than expanding teams, CISOs are looking to AI to multiply their existing workforce’s effectiveness—still, leaders remain cautious, continuing to evaluate how AI adoption will ultimately affect team dynamics and resource needs,” says Robb Reck, chief information, trust and security officer at Pax8. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">But he was quick to point out that “AI isn’t replacing cybersecurity professionals in 2026—it’s augmenting them</span><b><span data-contrast="none">.”</span></b><span data-contrast="none"> Still, CISOs might be hesitant to hire. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“Many companies are slowing hiring while they wait to see how AI agents will actually perform. The candidates who are getting hired? Those who lead with an AI-first mindset and can articulate how they’ll drive transformation, not just use the tools,” says Reck, those who “treat AI as something that will amplify their work rather than threaten it are the ones landing roles.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">The next two years will tell the tale. “Cybersecurity will no longer be a people-scaling problem. It will become an intelligence-scaling issue. AI-driven attacks force AI-driven defense,” says Varadarajan. “Teams stay lean, budgets get smarter, and machines take on the work humans were never meant to do at machine speed. By the end of the year, AI will handle a significant percentage of detection, investigation, and initial response, while humans focus on strategy, oversight, and high-risk decisions.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Regardless, though “whether through internal security teams or outsourcing part of their security operations to managed services firms, security teams must rapidly ramp up their usage of AI in response to the increased threat environment,” says Gerry. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/02/navigating-the-ai-revolution-in-cybersecurity-risks-rewards-and-evolving-roles/" data-a2a-title="Navigating the AI Revolution in Cybersecurity: Risks, Rewards, and Evolving Roles"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fnavigating-the-ai-revolution-in-cybersecurity-risks-rewards-and-evolving-roles%2F&linkname=Navigating%20the%20AI%20Revolution%20in%20Cybersecurity%3A%20Risks%2C%20Rewards%2C%20and%20Evolving%20Roles" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fnavigating-the-ai-revolution-in-cybersecurity-risks-rewards-and-evolving-roles%2F&linkname=Navigating%20the%20AI%20Revolution%20in%20Cybersecurity%3A%20Risks%2C%20Rewards%2C%20and%20Evolving%20Roles" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fnavigating-the-ai-revolution-in-cybersecurity-risks-rewards-and-evolving-roles%2F&linkname=Navigating%20the%20AI%20Revolution%20in%20Cybersecurity%3A%20Risks%2C%20Rewards%2C%20and%20Evolving%20Roles" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fnavigating-the-ai-revolution-in-cybersecurity-risks-rewards-and-evolving-roles%2F&linkname=Navigating%20the%20AI%20Revolution%20in%20Cybersecurity%3A%20Risks%2C%20Rewards%2C%20and%20Evolving%20Roles" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F02%2Fnavigating-the-ai-revolution-in-cybersecurity-risks-rewards-and-evolving-roles%2F&linkname=Navigating%20the%20AI%20Revolution%20in%20Cybersecurity%3A%20Risks%2C%20Rewards%2C%20and%20Evolving%20Roles" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>