Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense.

"The impact of AI on cybersecurity is clear and increasing. There are more employees and enterprise applications using AI that must be protected. Adversaries are using it to make their attacks more targeted, scalable, and successful. All of this is unfolding in a highly volatile geopolitical environment that is creating more uncertainty," said Jill Popelka, CEO, Darktrace. "There has never been a more urgent need for AI in the SOC to augment teams and pre-empt threats so organizations can build their cyber resilience. That's why Darktrace continues to invest in new innovations to help customers manage risk and thrive in this new era of AI threats."

The second annual report surveyed over 1,500 cybersecurity professionals holding roles ranging from CISO to IT security managers, IT security analysts and incident responders, across 14 different countries.

Key findings from the report include:

  • The increasing impact of AI-powered threats: This year, 78% of CISOs surveyed agreed that AI-powered cyber threats are having a significant impact on their organization, up 5% from 2024. AI combined with the increase of cybercrime-as-a-service and automation is increasing the sophistication and diversity of attack techniques faster than ever – from AI-enhanced phishing campaigns to evolving ransomware strains.
  • A gap between confidence in AI and comprehension of how it can be best deployed: 95% of all cybersecurity professionals surveyed believe AI can improve the speed and efficiency of their ability to prevent, detect, respond and recover from threats, but significant knowledge gaps persist. Only 42% reported that they fully understand the types of AI in their current security stack. The gap increases across different roles, with 60% of CISOs reporting they know exactly what AI types are used versus 10% of IT security analysts/operators and 14% of IT security administrators. Moreover, two of the top three inhibitors reported to defending against AI-powered threats include insufficient knowledge or use of AI-driven countermeasures and insufficient knowledge/skills pertaining to AI technology.
  • Teams are turning to AI to navigate talent and skills shortages: Despite respondents citing insufficient personnel to manage tools and alerts as the greatest inhibitor to defending against AI-powered threats, only 11% reported that they plan to increase cybersecurity staff in 2025, down from last year. AI is seen by this group as essential to augment human team members, with 64% reporting that they plan to add AI-powered solutions to their security stack in the next year and 88% reporting that the use of AI is critical to free up time for security teams to become more proactive.
  • Managing risk is a priority, but more action is needed: 95% of all respondents report that their organization is either currently discussing (50%) or has already implemented (45%) a formal policy for safe and secure use of AI. This varies regionally and by industry. 52% of organizations in North America and 43% of organizations in EMEA report having a formal policy in place. Organizations in the financial services, retail and technology sectors globally report the highest level of policies currently in place. At the same time, only 45% of respondents report that they have a formal AI oversight and governance function and only 37% report that they regularly monitor or audit AI usage and outputs.
  • Data privacy and a platform approach are top priorities: When asked about their cybersecurity technology preferences, respondents highlighted the importance of data privacy and a platform approach. Notably, 84% reported that they prefer solutions that don't require external data sharing and 87% indicated they prefer a platform approach over implementing a collection of point solutions.
  • Cloud and network security seen as key areas for future impact of AI: When asked to look ahead at the future impact of AI in cyber defense, cloud security (66%) and network security (55%) are identified as two domains where cybersecurity professionals expect defensive AI to have the biggest impact.

"The integrity and reliability of IT systems are under increasing pressure as adversaries harness Generative AI to amplify their attacks. The rapid evolution of AI-powered threats is forcing security teams to rethink their defensive strategies, as traditional cybersecurity measures can no longer match the speed, scale, and sophistication of modern attacks,” said Jon Mendoza, CISO of Technologent, a global provider of IT solutions and services for Fortune 1000 companies. “To stay ahead, organizations must integrate AI-driven security solutions that not only detect and respond to threats but proactively anticipate them. True resilience comes not just from deploying AI but from empowering security teams with the knowledge and tools to wield it effectively. A security platform built on actionable-intelligence and hyper-automation is essential to containing threats and minimizing the blast radius of attacks. In today’s ever-evolving threat landscape, AI isn’t just an advantage—it’s a fundamental necessity."

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities