Thursday, 7 May 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • White
  • VIDEO
  • man
  • Trumps
  • Season
  • star
  • Years
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds
Tech and Science

Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds

Last updated: November 2, 2025 3:35 am
Share
Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds
SHARE

The cybersecurity landscape is constantly evolving, with new threats emerging at a rapid pace. In response to this volatility, security and risk leaders are in need of practical guidance on managing existing spending and adapting to new budgetary requirements. Forrester’s 2026 Budget Planning Guide highlights a significant shift in how organizations allocate cybersecurity resources, with software now commanding 40% of cybersecurity spending, surpassing hardware, outsourcing, and personnel costs. This shift comes as organizations face gen AI attacks that execute in milliseconds, compared to a Mean Time to Identify (MTTI) of 181 days.

Three converging threats are challenging traditional cybersecurity measures. Generative AI (gen AI) enables attackers to craft personalized phishing emails at a rapid rate, posing a significant risk to organizations. The looming NIST quantum deadline threatens data encryption, with $425 billion at risk of retroactive decryption. Additionally, deepfake fraud has seen a 3,000% surge and now bypasses biometric authentication in 97% of attempts, forcing security leaders to rethink defensive strategies.

Platform consolidation is becoming essential as security teams managing multiple tools face integration challenges and lose millions annually to overhead costs. Gartner predicts a decline in interactive application security testing (IAST) tools, while Security Service Edge (SSE) platforms add complexity rather than simplifying operations. Standalone risk-rating products flood security operations centers with alerts lacking actionable context, leading to analysts spending significant time on false positives.

Security budgets are on the rise, with 55% of security leaders expecting significant increases in the next 12 months. The rise in budget reflects the asymmetric battlefield where attackers leverage gen AI to target thousands of employees simultaneously. Regional spending variations highlight different threat landscapes and responses, with Asia Pacific organizations leading in budget increases.

See also  Your passwords have probably been stolen and sold on the dark web

Software dominates cybersecurity budgets in 2025, reflecting the need for runtime defenses to combat emerging threats. Protecting the inference layer of AI model development is crucial, with cloud security, on-premises technology, and security awareness training topping investment priorities. Quantum computing poses a growing risk, with the need for organizations to prioritize Post-Quantum Cryptography (PQC) adoption.

The explosion of machine identities fuels a credential crisis, requiring scaling machine identity management to mitigate threats. Ivanti’s AI-driven Vulnerability Risk Rating (VRR) enables organizations to patch vulnerabilities faster, highlighting the importance of combining AI with Unified Endpoint Management (UEM). Forrester advises security leaders to divest legacy tools and prioritize integrated platforms for enhanced visibility and streamlined management.

Consolidating security at AI’s inference edge is crucial for CISOs to maintain control and secure AI deployments at scale. By following a clear playbook that includes robust behavioral anomaly detection and investing in runtime defenses, organizations can adapt to the evolving cybersecurity landscape and stay ahead of emerging threats.

TAGGED:attacksbudgetscommandscybersecurityexecuteGenMillisecondsSoftware
Share This Article
Twitter Email Copy Link Print
Previous Article Robin Hood season 1 release date, cast details, where to watch, episode count, and other latest updates so far Robin Hood season 1 release date, cast details, where to watch, episode count, and other latest updates so far
Next Article The 20 Best Checked Luggage Pieces, for Every Style and Budget The 20 Best Checked Luggage Pieces, for Every Style and Budget
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Popular Posts

Who needs Eurovision when we have the Dance Your PhD contest?

Feedback is New Scientist’s popular sideways look at the latest science and technology news. You…

May 16, 2025

Obama Judge Says to Hell with the Supreme Court, Orders Trump DOJ to Turn Over Docs Related to Decision to Revoke ‘Protected Status’ for Hundreds of Thousands of Migrants |

In a striking move, US District Court Judge Edward Chen, appointed by Obama, has thrown…

May 19, 2025

“Damage has been done” – Fans outrage at SM’s delayed response to alleged dating Winter-Jungkook rumors amid mounting online harassment

SM Entertainment has taken a stand to protect aespa's Winter from online attacks related to…

December 9, 2025

Elon Claims ‘Lying’ Trump Is A ‘Body Double’ Amid Spending Bill Fight

Elon Musk Claims Trump is Connected to Jeffrey Epstein in Twitter RantElon Musk recently took…

June 5, 2025

Canada welcomes King Charles against a backdrop of tensions with Trump : NPR

Britain's King Charles III is greeted by an honor guard after arriving at Macdonald-Cartier International…

May 26, 2025

You Might Also Like

How to Choose a Healthcare Software Development Company
Tech and Science

How to Choose a Healthcare Software Development Company

May 7, 2026
The hantavirus cruise ship outbreak is a dangerous experiment
Tech and Science

The hantavirus cruise ship outbreak is a dangerous experiment

May 7, 2026
Freshworks to cut 11% jobs as AI reshapes software industry
Economy

Freshworks to cut 11% jobs as AI reshapes software industry

May 7, 2026
Five architects of the AI economy explain where the wheels are coming off
Tech and Science

Five architects of the AI economy explain where the wheels are coming off

May 7, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?