Close Menu

    Subscribe to Updates

    Get the latest creative news from infofortech

    What's Hot

    File Your Taxes With TurboTax Full Service Now Before Prices Go Up

    March 17, 2026

    Death by Tariffs: Volvo Discontinuing Entry-Level EX30 EV in the US

    March 16, 2026

    Nvidia launches NemoClaw, Agent Toolkit to enhance AI agents

    March 16, 2026
    Facebook X (Twitter) Instagram
    InfoForTech
    • Home
    • Latest in Tech
    • Artificial Intelligence
    • Cybersecurity
    • Innovation
    Facebook X (Twitter) Instagram
    InfoForTech
    Home»Cybersecurity»Agentic AI, Boldness Gaps, and the Future of Security
    Cybersecurity

    Agentic AI, Boldness Gaps, and the Future of Security

    InfoForTechBy InfoForTechJanuary 16, 2026No Comments11 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Agentic AI, Boldness Gaps, and the Future of Security
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email


    Hello Cyber Builders 🖖

    With 2025 wrapping up, here’s a look back at what I covered this year. I know newsletters are supposed to focus on a few topics and go deep, but on Cyber Builders, I went the other way, exploring a range of themes.

    1. Agentic Transformation: The industry is moving from passive assistants to active, autonomous agents. This shift means reliability and better user experience matter more than ever. I also rolled out my own framework, HAEGID, to help make sense of it.

    2. Cybersecurity Market: I covered the 12 leading platforms shaping the market. When Gartner has 50+ acronyms (honestly, I stopped counting!), I tried to provide a comprehensive categorization of cybersecurity products.

    3. Economic Divergence: I looked at the ‘Boldness Gap’—why Europe lags behind Israel and the US in taking risks and investing big.

    4. New Security Debt: ‘Vibe Coding’ is on the rise, and so are the risks from AI-generated code. This means we need to rethink how we do Application Security.

    5. OT Security Difference: From my personal experience of the grid’s fragility to the looming shadow of nation-state threats and the expanding risks of our smart-energy transition, I mapped out why securing our power infrastructure is the most critical challenge for today’s cyber builders.

    6. Web3 Maturity: I’ve analyzed how crypto has graduated from a niche experiment to a foundational global utility, while simultaneously arguing that our security focus must shift from protecting hardware to safeguarding human identity in an AI-driven world.

    Let’s dig into each of these topics.

    This is a long newsletter, you better read it only, as the email is probably truncated ! Visit: https://cyberbuilders.substack.com/p/2025-wrap-up

    A big focus for me in 2025 was watching AI shift from passive helper to active agent. The cybersecurity industry needs new ways to build trust in these systems.

    Back in May, I pushed back against the industry’s focus on model power in my post ‘Stop Catching Up: What Agentic AI Can Fix in Cybersecurity.’ My take: building agents in 2025 is really about reliability and user experience, not just the AI itself.

    Stop Catching Up: What Agentic AI Can Fix in Cybersecurity

    Stop Catching Up: What Agentic AI Can Fix in Cybersecurity

    Here’s why I think that:

    • Deterministic Requirement: Cybersecurity is often black-and-white—a vulnerability is confirmed or not, a patch is applied or not. But generative AI works in probabilities, not certainties.

    • Trust Deficit: Co-Pilots (where a human is in the loop) can make mistakes because someone is there to catch them. Agents (no human in the loop) can’t. Once an agent can change production or block users, mistakes aren’t an option.

    • UX as the Differentiator: The real winners won’t be the ones with the most innovative models—those are becoming a commodity. It’ll be the teams who build the best guardrails, validation, and user interfaces so people can actually trust what the agent does.

    Bonus: my review of DARPA Grand Challenge of AI & Cybersecurity

    AI in Cybersecurity: Not a Magic Wand, But a Multiplier

    AI in Cybersecurity: Not a Magic Wand, But a Multiplier

    Intelligent Security Requires Validation & Orchestration

    Intelligent Security Requires Validation & Orchestration

    In October, I called the release of Claude 4.5 a ‘Maturity Moment.’ Instead of just looking at benchmarks, I focused on what ‘Context Engineering’ means for the field.

    Claude 4.5 and the Maturity Moment for Cybersecurity AI

    Claude 4.5 and the Maturity Moment for Cybersecurity AI

    Claude 4.5 stood out because it could manage its own context and work well with tools. That matters in cybersecurity, where you often need to process large volumes of logs and reports at once. Now, AI can finally treat cyber defense as a core use case, not just an afterthought. The real challenge is giving the model the correct data and tools, not just clever prompts.

    In November, I laid out my view on AI in security with the HAEGID Framework. The acronym is explained throughout, but here are the six main pillars I see as key to understanding AI’s impact.

    Beyond the "Co-Pilots" - Six Part AI-driven Security Framework

    Beyond the “Co-Pilots” – Six Part AI-driven Security Framework

    I put this framework together to make sense of how AI shows up in security products. It’s designed to cut through the AI Hangover and offer a straightforward way to see what really matters.

    • Humanize: Use tailored training and real-time prompts to empower your team’s defenses.

    • Assist: Help analysts become faster and more accurate with their tools from the start.

    • Enrich: Automatically gather context for alerts so analysts see the whole picture immediately.

    • Guide: Turn noisy data into clear incidents, steering teams toward correct action.

    • Intervene: Enable rapid, coordinated responses across all security tools.

    • Defend: Proactively hunt for threats and strengthen your defenses early.

    My view: feature-based AI is done. Adding ‘Summarize this alert’ isn’t enough now. Products need to be built around the HAEGID principles to last.

    2025 wrapup

    In 2025, I took on my biggest analytical project yet: mapping out 12 cybersecurity platforms. It kicked off in the spring with my most-read post of the year.

    The 12 Cybersecurity Platforms That Define Modern Security

    The 12 Cybersecurity Platforms That Define Modern Security

    Beyond the Buzzwords: The Six Foundations of the Future Cybersecurity Platform

    Beyond the Buzzwords: The Six Foundations of the Future Cybersecurity Platform

    I also wrote several deep dives on these platforms, including ‘AI is Reshaping The 12 Cybersecurity Platforms.’

    How AI Will Redefine the 12 Cybersecurity Platforms

    How AI Will Redefine the 12 Cybersecurity Platforms

    In January 2025, I wrote a data-driven breakdown of the Israeli cybersecurity sector, titled “Israel’s Cyber Strength: $4B Raised in 2024— and Counting.” This analysis went beyond simple fundraising statistics to investigate the ecosystem’s structural resilience. Despite significant geopolitical instability and regional conflict, the Israeli cyber sector demonstrated an uncanny ability to attract global capital.

    The analysis identified three “Key Drivers” behind this thriving ecosystem:

    1. The Military-Industrial Feedback Loop: The report highlighted the enduring relevance of units like 8200, which act not just as technical training grounds but as incubators for “offensive” thinking. This mindset—understanding the attacker’s perspective—is baked into the product DNA from day one. It also offers time to build mature technologies and skill sets before launching fast-growing ventures.

    2. Global-First Orientation: Unlike many European startups that focus on capturing their domestic market first (e.g., France, Germany), Israeli startups are structurally forced to ignore their small domestic market and target the US Global 2000 immediately. This necessitates a level of product maturity and sales & marketing intensity that European peers delay.

    3. Capital Recycling and Mentorship: The presence of second and third-time founders who reinvest both capital and operational wisdom creates a compounding effect.

    I see Israel as the most mature cybersecurity ecosystem in the world, and something too often overlooked, the most competitive one.

    Israel’s Cyber Strength: $4B Raised in 2024— and Counting

    Israel’s Cyber Strength: $4B Raised in 2024— and Counting

    In contrast, I authored the post “Cybersecurity in Europe: The Talent Is There—Where’s the Boldness?” as a wake-up call for Europe. I emphasized that the region faces a “fragmentation of ambition’ and clarified that the “Investment Gap” I mentioned is not just about the amount of capital but its quality.

    Furthermore, the analysis touched upon the regulatory environment, specifically the European Cyber Resiliency Act (CRA). While the blog acknowledged the CRA’s positive intent—mandating security-by-design and engineering standards—it also highlighted the risk of “Regulatory Drag.” Regulation indeed establishes a baseline of trust, but it cannot act as a substitute for innovation.

    There is a palpable tension between the European instinct to regulate AI and cyber tools and the American/Israeli instinct to build them. Without a shift in investor mindset—bridging the gap between “Scaling Faster” and “Competing Globally”—Europe risks becoming a consumer of cybersecurity rather than a producer.

    Cybersecurity in Europe: The Talent Is There—Where’s the Boldness?

    Cybersecurity in Europe: The Talent Is There—Where’s the Boldness?

    While much of the industry celebrated the productivity gains of AI coding assistants (like GitHub Co-pilot or Cursor), Cyber Builders focused on the dark underbelly of this trend. In July 2025, I introduced concepts like “Vibe Coding” and the exponential growth of Security Debt.

    In a collaboration on the “Hidden cost” of AI, I highlighted a staggering statistic: “Among YC startups in 2025, 95% of their code is reportedly generated by AI.”

    • Definition: “Vibe Coding” is a development style in which creators use AI to generate code based on a high-level “vibe” or intent, often without fully understanding the underlying syntax or security implications.

    • The Problem: “Creativity Accelerates Insecurity.” The friction of writing code used to be a natural throttle on the creation of vulnerabilities. With that friction removed, the volume of code—and thus the volume of vulnerabilities—explodes. The blog argues that this leads to “invisible liabilities” that accumulate faster than any human security team can audit.

    “Application Security – AI Won’t Save You.” In 2025, AppSec teams must own the basics, slash security debt, and build security in collaboration with the dev team.

    Scanners generate noise. If you have an AI coding bot generating 10x the code, and an AI security scanner generating 10x the alerts, you have scaled the chaos by 10x. You have not solved the problem.

    I’ve been diving deep into the digital nerves of our society: the power grid. It’s a topic that is often invisible until it’s gone, and through three interconnected articles, I’ve tried to map out why the stakes for “Cyber Builders” have never been higher.

    I started by sharing a personal story in When the Lights Went Out. It’s easy to talk about “infrastructure security” in a boardroom, but everything changes when the lights actually flicker and die. For me, experiencing a blackout firsthand wasn’t just a minor inconvenience; it was a stark reminder of our total, fragile dependency on the flow of electrons. It turned a technical challenge into a human one. I realized that as we build the next generation of digital tools, we aren’t just protecting data—we are protecting the warmth in our homes and the safety of our streets.

    Even though a cyberattack did not cause the Spanish blackout, I examined various cyber threats to power grids. In Gridlocked, I explored the cold reality of modern geopolitics. Power grids have become the ultimate “crown jewels” for nation-state actors. Whether it’s the shadow of Sandworm or the stealthy pre-positioning of groups like Volt Typhoon, the goal has shifted. It’s no longer just about immediate disruption; it’s about strategic leverage. I argued that the grid is now a digital battlefield where “living off the land” techniques allow adversaries to hide in plain sight, waiting for the moment when a flick of a switch can achieve more than a physical strike ever could.

    Finally, I looked toward the future in When the Grid Gets Smart, the Threat…. We are currently in the middle of a massive energy transition. We need “smart” grids to manage renewables, electric vehicles, and distributed energy.

    But here is the paradox I’ve been wrestling with: every “smart” device—every connected solar inverter and EV charger—is a new door for an attacker. By decentralizing our energy, we are exponentially expanding our attack surface. We are moving from a world of a few massive targets to a world of millions of tiny ones, and our security models haven’t yet caught up to this “Edge” reality.

    Lastly, this December, I’ve been looking at how the very nature of digital trust is shifting beneath our feet, moving from specialized technical problems to the foundational pillars of our daily lives.

    First, I took a hard look at the state of decentralized economy and technologies in 2025: Crypto Isn’t Niche Anymore. For years, we’ve treated blockchain as a side quest or a speculative bubble, but we’ve reached a tipping point where it has become essential infrastructure. Whether through stablecoins acting as global payment rails or the tokenization of real-world assets, crypto is no longer a playground for the few—it is the new plumbing for a more transparent and efficient global economy.

    This evolution of infrastructure brought me to an even deeper question: how do we protect the people using it? In my conversation with Adrian Ludwig, From Securing Devices to Securing Humanity, we discussed a fundamental shift in the cybersecurity mission. In an era where AI can mimic almost any digital footprint, simply “securing the digital layers (device, software, cloud, network)” is no longer enough. We are entering an age where our primary challenge is verifying our very humanity through new primitives like “Proof of Human,” ensuring that the digital world remains a space built for and by people, rather than a sea of automated deception.

    As 2025 draws to a close, one thing stands out: the future of cybersecurity will be shaped by those willing to rethink how we defend an automated, hyper-connected world. From agentic AI and the 12 security platforms to OT resilience, Web3, and Proof of Human, the stakes have never been higher—and neither have the opportunities.

    Thanks for being part of Cyber Builders this year. If these ideas connect with you, stick around—2026 is when we start making more of them real.

    Laurent 💚

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    InfoForTech
    • Website

    Related Posts

    Why Security Validation Is Becoming Agentic

    March 16, 2026

    Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026

    March 15, 2026

    OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

    March 15, 2026

    GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

    March 14, 2026

    Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

    March 13, 2026

    Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

    March 13, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    How a Chinese AI Firm Quietly Pulled Off a Hardware Power Move

    January 15, 20268 Views

    The World’s Heart Beats in Bytes — Why Europe Needs Better Tech Cardio

    January 15, 20265 Views

    HHS Is Using AI Tools From Palantir to Target ‘DEI’ and ‘Gender Ideology’ in Grants

    February 2, 20264 Views

    Rising Digital Financial Fraud in South Africa

    January 15, 20264 Views
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Advertisement
    About Us
    About Us

    Our mission is to deliver clear, reliable, and up-to-date information about the technologies shaping the modern world. We focus on breaking down complex topics into easy-to-understand insights for professionals, enthusiasts, and everyday readers alike.

    We're accepting new partnerships right now.

    Facebook X (Twitter) YouTube
    Most Popular

    How a Chinese AI Firm Quietly Pulled Off a Hardware Power Move

    January 15, 20268 Views

    The World’s Heart Beats in Bytes — Why Europe Needs Better Tech Cardio

    January 15, 20265 Views

    HHS Is Using AI Tools From Palantir to Target ‘DEI’ and ‘Gender Ideology’ in Grants

    February 2, 20264 Views
    Categories
    • Artificial Intelligence
    • Cybersecurity
    • Innovation
    • Latest in Tech
    © 2026 All Rights Reserved InfoForTech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.