Hello Cyber Builders đ
With 2025 wrapping up, hereâs a look back at what I covered this year. I know newsletters are supposed to focus on a few topics and go deep, but on Cyber Builders, I went the other way, exploring a range of themes.
-
Agentic Transformation: The industry is moving from passive assistants to active, autonomous agents. This shift means reliability and better user experience matter more than ever. I also rolled out my own framework, HAEGID, to help make sense of it.
-
Cybersecurity Market: I covered the 12 leading platforms shaping the market. When Gartner has 50+ acronyms (honestly, I stopped counting!), I tried to provide a comprehensive categorization of cybersecurity products.
-
Economic Divergence:Â I looked at the ‘Boldness Gap’âwhy Europe lags behind Israel and the US in taking risks and investing big.
-
New Security Debt:Â ‘Vibe Coding’ is on the rise, and so are the risks from AI-generated code. This means we need to rethink how we do Application Security.
-
OT Security Difference: From my personal experience of the gridâs fragility to the looming shadow of nation-state threats and the expanding risks of our smart-energy transition, I mapped out why securing our power infrastructure is the most critical challenge for today’s cyber builders.
-
Web3 Maturity: Iâve analyzed how crypto has graduated from a niche experiment to a foundational global utility, while simultaneously arguing that our security focus must shift from protecting hardware to safeguarding human identity in an AI-driven world.
Letâs dig into each of these topics.
This is a long newsletter, you better read it only, as the email is probably truncated ! Visit: https://cyberbuilders.substack.com/p/2025-wrap-up
A big focus for me in 2025 was watching AI shift from passive helper to active agent. The cybersecurity industry needs new ways to build trust in these systems.
Back in May, I pushed back against the industryâs focus on model power in my post ‘Stop Catching Up: What Agentic AI Can Fix in Cybersecurity.’ My take: building agents in 2025 is really about reliability and user experience, not just the AI itself.
Hereâs why I think that:
-
Deterministic Requirement:Â Cybersecurity is often black-and-whiteâa vulnerability is confirmed or not, a patch is applied or not. But generative AI works in probabilities, not certainties.
-
Trust Deficit:Â Co-Pilots (where a human is in the loop) can make mistakes because someone is there to catch them. Agents (no human in the loop) canât. Once an agent can change production or block users, mistakes arenât an option.
-
UX as the Differentiator:Â The real winners wonât be the ones with the most innovative modelsâthose are becoming a commodity. Itâll be the teams who build the best guardrails, validation, and user interfaces so people can actually trust what the agent does.
Bonus: my review of DARPA Grand Challenge of AI & Cybersecurity
In October, I called the release of Claude 4.5 a ‘Maturity Moment.’ Instead of just looking at benchmarks, I focused on what ‘Context Engineering’ means for the field.
Claude 4.5 stood out because it could manage its own context and work well with tools. That matters in cybersecurity, where you often need to process large volumes of logs and reports at once. Now, AI can finally treat cyber defense as a core use case, not just an afterthought. The real challenge is giving the model the correct data and tools, not just clever prompts.
In November, I laid out my view on AI in security with the HAEGID Framework. The acronym is explained throughout, but here are the six main pillars I see as key to understanding AIâs impact.
I put this framework together to make sense of how AI shows up in security products. Itâs designed to cut through the AI Hangover and offer a straightforward way to see what really matters.
-
Humanize: Use tailored training and real-time prompts to empower your teamâs defenses.
-
Assist: Help analysts become faster and more accurate with their tools from the start.
-
Enrich: Automatically gather context for alerts so analysts see the whole picture immediately.
-
Guide: Turn noisy data into clear incidents, steering teams toward correct action.
-
Intervene: Enable rapid, coordinated responses across all security tools.
-
Defend: Proactively hunt for threats and strengthen your defenses early.
My view: feature-based AI is done. Adding ‘Summarize this alert’ isnât enough now. Products need to be built around the HAEGID principles to last.
In 2025, I took on my biggest analytical project yet: mapping out 12 cybersecurity platforms. It kicked off in the spring with my most-read post of the year.
I also wrote several deep dives on these platforms, including ‘AI is Reshaping The 12 Cybersecurity Platforms.’
In January 2025, I wrote a data-driven breakdown of the Israeli cybersecurity sector, titled âIsraelâs Cyber Strength: $4B Raised in 2024â and Counting.â This analysis went beyond simple fundraising statistics to investigate the ecosystem’s structural resilience. Despite significant geopolitical instability and regional conflict, the Israeli cyber sector demonstrated an uncanny ability to attract global capital.
The analysis identified three âKey Driversâ behind this thriving ecosystem:
-
The Military-Industrial Feedback Loop: The report highlighted the enduring relevance of units like 8200, which act not just as technical training grounds but as incubators for âoffensiveâ thinking. This mindsetâunderstanding the attackerâs perspectiveâis baked into the product DNA from day one. It also offers time to build mature technologies and skill sets before launching fast-growing ventures.
-
Global-First Orientation: Unlike many European startups that focus on capturing their domestic market first (e.g., France, Germany), Israeli startups are structurally forced to ignore their small domestic market and target the US Global 2000 immediately. This necessitates a level of product maturity and sales & marketing intensity that European peers delay.
-
Capital Recycling and Mentorship: The presence of second and third-time founders who reinvest both capital and operational wisdom creates a compounding effect.
I see Israel as the most mature cybersecurity ecosystem in the world, and something too often overlooked, the most competitive one.
In contrast, I authored the post âCybersecurity in Europe: The Talent Is ThereâWhereâs the Boldness?â as a wake-up call for Europe. I emphasized that the region faces a âfragmentation of ambition’ and clarified that the âInvestment Gapâ I mentioned is not just about the amount of capital but its quality.
Furthermore, the analysis touched upon the regulatory environment, specifically the European Cyber Resiliency Act (CRA). While the blog acknowledged the CRAâs positive intentâmandating security-by-design and engineering standardsâit also highlighted the risk of âRegulatory Drag.â Regulation indeed establishes a baseline of trust, but it cannot act as a substitute for innovation.
There is a palpable tension between the European instinct to regulate AI and cyber tools and the American/Israeli instinct to build them. Without a shift in investor mindsetâbridging the gap between âScaling Fasterâ and âCompeting GloballyââEurope risks becoming a consumer of cybersecurity rather than a producer.
While much of the industry celebrated the productivity gains of AI coding assistants (like GitHub Co-pilot or Cursor), Cyber Builders focused on the dark underbelly of this trend. In July 2025, I introduced concepts like âVibe Codingâ and the exponential growth of Security Debt.
In a collaboration on the âHidden costâ of AI, I highlighted a staggering statistic: âAmong YC startups in 2025, 95% of their code is reportedly generated by AI.â
-
Definition: âVibe Codingâ is a development style in which creators use AI to generate code based on a high-level âvibeâ or intent, often without fully understanding the underlying syntax or security implications.
-
The Problem: âCreativity Accelerates Insecurity.â The friction of writing code used to be a natural throttle on the creation of vulnerabilities. With that friction removed, the volume of codeâand thus the volume of vulnerabilitiesâexplodes. The blog argues that this leads to âinvisible liabilitiesâ that accumulate faster than any human security team can audit.
âApplication Security – AI Wonât Save You.â In 2025, AppSec teams must own the basics, slash security debt, and build security in collaboration with the dev team.
Scanners generate noise. If you have an AI coding bot generating 10x the code, and an AI security scanner generating 10x the alerts, you have scaled the chaos by 10x. You have not solved the problem.
Iâve been diving deep into the digital nerves of our society: the power grid. Itâs a topic that is often invisible until itâs gone, and through three interconnected articles, Iâve tried to map out why the stakes for âCyber Buildersâ have never been higher.
I started by sharing a personal story in When the Lights Went Out. Itâs easy to talk about âinfrastructure securityâ in a boardroom, but everything changes when the lights actually flicker and die. For me, experiencing a blackout firsthand wasnât just a minor inconvenience; it was a stark reminder of our total, fragile dependency on the flow of electrons. It turned a technical challenge into a human one. I realized that as we build the next generation of digital tools, we arenât just protecting dataâwe are protecting the warmth in our homes and the safety of our streets.
Even though a cyberattack did not cause the Spanish blackout, I examined various cyber threats to power grids. In Gridlocked, I explored the cold reality of modern geopolitics. Power grids have become the ultimate âcrown jewelsâ for nation-state actors. Whether itâs the shadow of Sandworm or the stealthy pre-positioning of groups like Volt Typhoon, the goal has shifted. Itâs no longer just about immediate disruption; itâs about strategic leverage. I argued that the grid is now a digital battlefield where âliving off the landâ techniques allow adversaries to hide in plain sight, waiting for the moment when a flick of a switch can achieve more than a physical strike ever could.
Finally, I looked toward the future in When the Grid Gets Smart, the Threat…. We are currently in the middle of a massive energy transition. We need âsmartâ grids to manage renewables, electric vehicles, and distributed energy.
But here is the paradox Iâve been wrestling with: every âsmartâ deviceâevery connected solar inverter and EV chargerâis a new door for an attacker. By decentralizing our energy, we are exponentially expanding our attack surface. We are moving from a world of a few massive targets to a world of millions of tiny ones, and our security models havenât yet caught up to this âEdgeâ reality.
Lastly, this December, Iâve been looking at how the very nature of digital trust is shifting beneath our feet, moving from specialized technical problems to the foundational pillars of our daily lives.
First, I took a hard look at the state of decentralized economy and technologies in 2025: Crypto Isnât Niche Anymore. For years, weâve treated blockchain as a side quest or a speculative bubble, but weâve reached a tipping point where it has become essential infrastructure. Whether through stablecoins acting as global payment rails or the tokenization of real-world assets, crypto is no longer a playground for the fewâit is the new plumbing for a more transparent and efficient global economy.
This evolution of infrastructure brought me to an even deeper question: how do we protect the people using it? In my conversation with Adrian Ludwig, From Securing Devices to Securing Humanity, we discussed a fundamental shift in the cybersecurity mission. In an era where AI can mimic almost any digital footprint, simply âsecuring the digital layers (device, software, cloud, network)â is no longer enough. We are entering an age where our primary challenge is verifying our very humanity through new primitives like âProof of Human,â ensuring that the digital world remains a space built for and by people, rather than a sea of automated deception.
As 2025 draws to a close, one thing stands out: the future of cybersecurity will be shaped by those willing to rethink how we defend an automated, hyper-connected world. From agentic AI and the 12 security platforms to OT resilience, Web3, and Proof of Human, the stakes have never been higherâand neither have the opportunities.
Thanks for being part of Cyber Builders this year. If these ideas connect with you, stick aroundâ2026 is when we start making more of them real.
Laurent đ



