AI claims are cheap: The challenge is to work out what's real | Computer Weekly
Briefly

"AI in security isn't a futuristic add-on anymore. It's already embedded across tools many organisations use daily: email security, endpoint detection, SIEM/SOAR, identity protection, data loss prevention, vulnerability management, and managed services. Vendors have relied on machine learning for years; generative artificial intelligence (GenAI) is simply the latest label stuck on the front. What changes in 2026 is the story being sold. Boards are asking about AI. Procurement teams are adding AI clauses. CISOs are under pressure to be seen to "do something with AI"."
"Alongside that comes the familiar FUD cycle: attackers are using AI, so if you don't buy our AI, you're behind. There's a grain of truth - attackers do use automation and will increasingly use AI - but it's often used to rush buyers into tools that haven't proven they reduce risk in your environment. It's the same sales playbook as ever, just wearing an AI trenchcoat."
AI is already integrated across email security, endpoint detection, SIEM/SOAR, identity protection, data loss prevention, vulnerability management, and managed services. Many vendors relabel existing machine learning capabilities as generative AI (GenAI). In 2026 increased board scrutiny, procurement clauses, and CISO pressure will fuel marketing noise and bolder AI promises. That environment will produce more AI-washed products and automation pitches claiming to replace SOC functions. Attackers are also adopting automation and AI, which vendors use to stoke fear and accelerate purchases. Buyers should assess specific product AI maturity, measurable risk reduction, and governance risks such as data leakage and model risk.
Read at ComputerWeekly.com
Unable to calculate read time
[
|
]