By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds
Computing

AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds

News Room
Last updated: 2026/03/17 at 8:19 AM
News Room Published 17 March 2026
Share
AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds
SHARE

The Hacker NewsMar 17, 2026Artificial Intelligence / Security Leadership

A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the challenge, according to the AI and Adversarial Testing Benchmark Report 2026 from Pentera.

The report, based on a survey of 300 US CISOs and senior security leaders, examines how organizations are securing AI infrastructure and highlights critical gaps tied to skills shortages and reliance on security controls not designed for the AI era.

AI adoption is outpacing security visibility

AI systems are rarely deployed in isolation. They are layered across and integrated into existing corporate technology, from cloud platforms and identity systems to applications and data pipelines. With ownership spread across disparate teams, effective centralized oversight has collapsed.

As a result, 67 percent of CISOs reported limited visibility into how AI is being used across their organization. None of the respondents indicated they have full visibility; rather, they acknowledge being aware of or accepting some form of unmanaged or unsanctioned AI usage.

Without a clear view of where AI systems operate or what resources they can access, security teams struggle to assess risk effectively. Basic questions, such as which identities AI systems rely on, what data they can reach, or how they behave when controls fail, often remain unanswered.

Skills, not budget, are the primary barrier

Although AI security is now a regular topic in boardrooms and executive discussions, the study shows that the biggest challenges are not financial.

CISOs identified the following as their top obstacles to securing AI infrastructure:

  • Lack of internal expertise (50 percent)
  • Limited visibility into AI usage (48 percent)
  • Insufficient security tools designed specifically for AI systems (36 percent)

Only 17 percent cited budget constraints as a primary concern. This suggests that many organizations are willing to invest in AI security, but do not yet have the specialized skills needed to evaluate AI-related risks in real environments.

AI systems introduce behaviors that security teams are still learning to assess, including autonomous decision-making, indirect access paths, and privileged interaction between systems. Without the right expertise and active testing, it becomes difficult to evaluate whether existing controls are effective as intended.

Legacy controls are carrying most of the load

In the absence of AI-specific best practices, skills, and tooling, most enterprises are extending existing security controls to cover AI infrastructure.

The study found that 75 percent of CISOs rely on legacy security controls, such as endpoint, application, cloud, or API security tools, to protect AI systems. Only 11 percent reported having security tools designed specifically to secure AI infrastructure.

This approach reflects a familiar pattern seen during previous technology shifts, where organizations initially adapt existing defenses before more tailored security practices emerge. While this can provide basic coverage, controls built for traditional systems may not account for how AI changes access patterns and expands potential attack paths.

A familiar challenge, now applied to AI

Taken together, the findings show that AI security challenges stem from foundational gaps rather than a lack of awareness or intent.

As AI becomes a core part of enterprise infrastructure, the report suggests that organizations will need to focus on building expertise and improving how they validate security controls across environments where AI is already operating.

To explore the full findings, download the AI and Adversarial Testing Benchmark Report 2026 for a deeper discussion of the data and key takeaways.

Note: This article was written by Ryan Dory, Director, Technical Advisors at Pentera. 

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article I Love How Skinny Oppo's Foldable Phone Is, but I Hate That I Can't Buy It I Love How Skinny Oppo's Foldable Phone Is, but I Hate That I Can't Buy It
Next Article Oppo Find N6 Review: A great foldable that you probably can’t buy Oppo Find N6 Review: A great foldable that you probably can’t buy
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

System76 New Thelio Mira Linux Desktop Running Strong – Powered By AMD Ryzen 9000 Series Review
System76 New Thelio Mira Linux Desktop Running Strong – Powered By AMD Ryzen 9000 Series Review
Computing
QCon London 2026: Shipping Constantly with Humans and Beyond at Monzo
QCon London 2026: Shipping Constantly with Humans and Beyond at Monzo
News
BYD reportedly sets up new team to work on AI algorithms, supercomputing · TechNode
BYD reportedly sets up new team to work on AI algorithms, supercomputing · TechNode
Computing
'One Battle After Another': Where to Stream the Explosive 2026 Best Picture Winner
'One Battle After Another': Where to Stream the Explosive 2026 Best Picture Winner
News

You Might also Like

System76 New Thelio Mira Linux Desktop Running Strong – Powered By AMD Ryzen 9000 Series Review
Computing

System76 New Thelio Mira Linux Desktop Running Strong – Powered By AMD Ryzen 9000 Series Review

2 Min Read
BYD reportedly sets up new team to work on AI algorithms, supercomputing · TechNode
Computing

BYD reportedly sets up new team to work on AI algorithms, supercomputing · TechNode

1 Min Read
MTN to absorb 2,762 IHS Towers staff in .2 billion acquisition
Computing

MTN to absorb 2,762 IHS Towers staff in $2.2 billion acquisition

5 Min Read
G2 2026 best software product: Hootsuite ranks #1 in marketing
Computing

G2 2026 best software product: Hootsuite ranks #1 in marketing

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?