drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

AI Is Redefining Cybersecurity: Why Awareness Alone No Longer Protects Us

by Jon Seals | October 29, 2025 | | 0 comments

AI has become both a powerful ally and an equally formidable adversary in cybersecurity. As National Cybersecurity Awareness Month reminds us, the landscape has shifted far beyond phishing emails and password hygiene. Today’s attackers are using AI to automate deception, chain vulnerabilities, and exploit human trust at scale, while defenders are harnessing it to detect threats, secure systems, and amplify human expertise. From deepfake-enabled scams to “bionic hackers” using AI for defense, one message resounds across the industry: awareness isn’t enough anymore. Action, adaptation, and AI-powered resilience are the new front lines.

Industry leaders across the tech ecosystem — such as Lineaje, HackerOne, LearnUpon, Protegrity, Securin, Luminys, Foxit, and more— are calling for a redefinition of what “awareness” means in 2025. The traditional focus on education and vigilance must evolve into a multi-layered defense strategy powered by real-time intelligence, ethical innovation, and human-AI collaboration.

Javed Hasan, CEO and Co-founder, Lineaje  

“Open-source has long anchored the software world, but now AI is becoming its new foundation. Every model, dataset, and pipeline now functions like a dependency, one that can be easily compromised if not properly secured. 

“There’s so much noise about AI, so it’s easy to focus on innovation and overlook the infrastructure beneath it. But the truth is, sourcing safe AI is as critical as writing secure code — which many developers and security teams are already struggling with. Without visibility into how models are built, we’ll face the same issues we’re plagued with in open-source, which causes 95% of software weaknesses. Open source taught us the cost of assuming trust; AI offers us a rare chance to build it from the beginning.

“The next evolution of software supply chain security will be defined by how we secure intelligence. AI won’t be just another tool in the chain; it is the new frontier. This National Cybersecurity Awareness Month, it’s time to treat AI with the same rigor, transparency, and accountability that we are just now starting to hold open-source to.”  

Sandy Kronenberg, CEO and Founder, Netarx 
“Social engineering has always been a bad actor’s most reliable weapon. Now AI has supercharged it. Phishing emails, smishing texts, vishing calls, and deepfakes are no longer isolated; they are now blended into coordinated attacks that overwhelm employees and exploit trust across multiple channels.  

“We’ve seen a 900% increase in deepfake-related cybercrime in the past year. At the same time, phishing remains the primary entry point for the majority of breaches, and voice-clone scams are growing at a rate of 66% year-over-year. Attackers stitch these together: a phishing email primes an employee to expect a call, the call comes from a voice-cloned “executive,” and a smishing text with a malicious link reinforces it. This choreography leaves little room for doubt, unless the proper defenses are in place. 

“Traditional tools aren’t designed for this. Malware scanners won’t detect a video puppeteering your CFO. Secure email gateways can’t flag a convincing message that passes authentication checks. Awareness training, while valuable, can’t prepare someone for a synthetic voice that sounds exactly like their boss giving urgent instructions. The gap is at the human layer of trust.  

“Cybersecurity Awareness Month is the time to move beyond awareness alone. Leaders need to close that gap with real-time, AI-powered validation that cuts across email, messaging, voice, and video. Fraud losses tied to deepfakes are projected to exceed $25 billion annually by 2026. The cost of waiting is far higher than the cost of acting now.” 

Dr. Srinivas Mukkamala,CEO, Securin

“As artificial intelligence continues to accelerate bad actors’ skills, organizations are finding themselves outpaced by this growing threat. Adversaries are now using AI to identify weaknesses, automate phishing campaigns and chain exploits at a scale that manual operations never allowed. Defenders cannot afford to respond with yesterday’s playbook. As I have said before, you must fight AI with AI; you must fight machine speed with operational speed.  

“Traditional security models often fixate on individual flaws. AI changes that equation by amplifying what I call “toxic combinations;” linked CVEs, CWEs and misconfigurations that may seem minor in isolation but, when combined, form critical points of failure. Addressing these requires secure-by-design engineering, systematic AI red teaming to uncover hidden vulnerabilities, and clear labeling frameworks that give organizations visibility into how AI systems function.   

“Cybersecurity Awareness Month is not just about awareness. It is a reminder that resilience comes from adaptation, and that adaptation must keep pace with the AI-driven threats shaping today’s digital landscape.” 

Sandeep Singh, Senior Director, Security Strategy and Operations atHackerOne

“Across the cybersecurity industry, researchers are evolving just as quickly as the risks they face, driven in large part by the use of AI. As we observe Cybersecurity Awareness Month, it’s important to recognize that AI isn’t replacing human expertise; it’s amplifying it.  

“With the rise of AI, we’re seeing the emergence of the ‘bionic hacker’ – a security researcher who uses AI to amplify human creativity and skill. These security researchers aren’t being replaced by AI; they’re harnessing it to supercharge reconnaissance, triage, pattern recognition, and exploration of complex attack surfaces.   

“HackerOne research found that 70% of researchers now describe themselves as AI-native, leveraging AI tools to enhance their hunting abilities and accelerate testing, making it possible to identify risks and threats more efficiently than ever before. At the same time, AI adoption across industries is surging. In the past year alone, the number of AI systems included in security testing grew by 270%. 

“The stakes have never been higher, and human expertise remains as crucial as ever. Cybersecurity Awareness Month is no longer just about spotting phishing emails or practicing online safety. It is about preparing for a future where human creativity and AI work side by side to secure the internet.” 

Averell Gatton, Director of GenAI, Protegrity  

“Generative artificial intelligence has entered widespread enterprise adoption, but its security architecture remains underdeveloped. Large language models and multi-agent systems process substantial volumes of sensitive information. Their ability to accelerate research, automate decision workflows, and generate insights has expanded rapidly, yet the increase in functionality comes with a massive increase in attack surface from potentially jail broken agentic systems. In this context, data security has become an essential tool in the GenAI age. 

 ”Recent research underscores the scale of these concerns. Enterprises are reacting by blocking 18.5 percent of AI and machine learning transactions, a 577 percent increase over a nine-month period, according to Zscaler. This pattern illustrates growing caution as many companies adopt defensive measures in the absence of formalized AI governance policies.  

 ”Security integration into the development pipeline is emerging as an essential ingredient in production AI systems. Techniques such as field-level encryption, tokenization, and privacy-preserving design allow rapid development of AI systems while reducing exposure of regulated data. Embedding protection at every stage of the model lifecycle provides a foundation for building systems that are both operationally useful and compliant with regulatory standards.  

 ”Cybersecurity Awareness Month highlights how rapidly the balance between innovation and protection is shifting. The effectiveness of AI technologies will increasingly depend on whether security is treated as an inseparable part of their design.” 

Richard Bird, CSO, Singulr AI
“Cybersecurity Awareness Month should be much more than a reminder about phishing emails. In 2025, awareness should mean visibility into how employees are actually using AI, guardrails and security controls to keep autonomous systems from running amok, and promoting a culture that balances responsible decisions with innovation. 

“The details on why these steps matter are in the data: the 2023 Verizon DBIR found that 74% of breaches still involved the human element, 83% involved external actors, and 95% were financially driven. 

“Traditional awareness programs haven’t gone far enough to shift those numbers, and now the risks have increased exponentially. Agents that can act at machine speed, combined with employees adopting AI tools without oversight, means that small mistakes can turn into significant exposures at velocities and volumes we’ve never experienced before. 

“Awareness can’t stop at PowerPoint slides and click-through training exercises. Organizations need modern governance and oversight that adapts to how work is being done inside their organizations today, particularly with AI in the mix. Without it, we’ll continue to recycle the old approaches while the risks continue multiplying faster than we can respond.” 

Jay Bavisi, Group President, EC-Council 
“Artificial intelligence is reshaping every dimension of security. It gives defenders new capabilities, yet it also accelerates the speed and scale of threats. The true measure of preparedness will not come from technology alone but from a workforce that is trained, certified, and ready to apply AI responsibly while thinking with the mindset of an adversary. Certified ethical hackers represent this readiness. They validate defenses in real-world conditions and ensure that organizations remain resilient as the threat landscape continues to evolve. Technology will advance without end, but it is the ethical human mind that ultimately secures the future.” 

Dan Bridges, Technical Director – International at Cyware
“Businesses today are connected through an invisible digital network, and while this is great news for ecommerce, it can also lead to a number of unguarded back doors just waiting to be exploited. With the latest attack on European airports highlighting the worrying trend of industry level cyber threats, following successful campaigns on the manufacturing and retail industries, businesses must maintain high levels of vigilance over their entire threat surface landscape. 

“Too often now, supply chains are coming under fire and falling foul to ransomware threats. These channels are essential to businesses, and yet they can often remain poorly defended. Much like a row of dominoes, once one organization succumbs to a cyberattack, an offensive chain is unleashed upon the industry, with each falling domino serving as the catalyst to topple the next. 

“Businesses need to present a unified front, working together to improve defenses, fix flaws and mitigate potential vulnerabilities. Through cooperation-based defensive alliances, organizations can work together across threat intelligence platforms (TIPs) and related threat sharing and collaboration capabilities. These platforms act as the heart of an organization’s cyber defenses, gathering information from across multiple sources – from public feeds, to industry reports – and distributing this across internal teams – and externally across community ecosystems, including organizations within your supply chain. These platforms provide businesses with the perfect foundation upon which to build their cyber defenses so they can be better prepared to defend against attackers at all levels of the organization.”  

Freddy Kuo, Chairman, Luminys

 “National Cybersecurity Awareness Month is an important reminder that true security goes beyond digital. It must also safeguard the physical world. While AI has the power to turn raw data into real-time intelligence, too many physical systems remain passive by simply storing footage without interpreting or acting on it.   

“That passivity has consequences. Despite three-quarters of organizations identifying physical security as a top priority, 60% still faced breaches in the past five years. As technology advances, so must the processes and governance frameworks that support it.   

“The solution isn’t more data, it’s smarter systems and aligned action. Smarter security systems demand smarter, updated Standard Operating Procedures (SOPs) to ensure organizations fully benefit from new capabilities and avoid falling behind. We need intelligent platforms that can anticipate and prevent incidents before they occur and ensure that manufacturers, integrators and end users review and strengthen their security practices regularly.   

“Without that alignment and visibility, even the most advanced platforms can leave blind spots. The future of smarter security depends on advancing both the technology and processes around it, together.“ 

Ron Reiter, Co-Founder & CTO, Sentra

“One of the most overlooked AI risks today is shadow and duplicate data. IBM has identified it as one of the top cost drivers in breaches, and for good reason. Shadow data is a prime target for attackers because it often exists outside a security team’s visibility. You can’t protect what you don’t even know exists. 

“This is no longer just a security problem; it’s a business risk. As AI systems become embedded in daily operations, organizations are effectively bringing on digital coworkers they didn’t hire and can’t fully supervise. These systems make decisions, access sensitive data, and move at machine speed, which means risks escalate quickly when governance is missing. 

“This Cybersecurity Awareness Month, the lesson isn’t only about finding shadow data. It’s about understanding which risks matter most and remediating them before unintended actions can expose sensitive data and/or attackers take advantage. Governance begins with visibility, and controls must follow the data across cloud, SaaS, and on-prem environments. Without that real-time view, leaders are leaving gaps that are easy to exploit.” 

Derek O’Neill, Director of Data Privacy and Information Security, Foxit
“Cybersecurity Awareness Month is a reminder that security isn’t just about hackers in hoodies or high-tech firewalls — it’s about the everyday documents we send, share, and store. Think about contracts, medical forms, or financial statements; they often hold the most sensitive information in a business. With AI making it easier than ever to create and move information, the stakes are higher too. And it’s not only about keeping out bad actors — regulations like GDPR and HIPAA mean organizations are expected to handle that data responsibly every single step of the way. 

“The good news is that technology can help – no huge surprise there! AI can catch things people might miss, i.e., flagging unusual activity, spotting sensitive details that need redaction, or even simplifying compliance reporting. But at the end of the day… it also comes down to basics like encrypting files, limiting access to the right people, and keeping clear records of where documents go. This month is a chance to pause and remember that security and compliance aren’t roadblocks to innovation — they’re what make it possible for people to trust the systems we use every day.” 

Yousef Hazimee, Head of Security, LearnUpon

“From increasingly sophisticated attack methods to emerging technologies like AI, cyber threats are evolving fast. That’s why it’s essential for security teams to provide employees with training that’s current, engaging, and easy to apply in their everyday work. 

“To help employees recognize potential security threats, I encourage organizations to use this Cybersecurity Awareness Month to re-evaluate their training programs. Ask employees for feedback, identify what’s working, and update what’s not. 

“When creating a security program, it’s always best to design it with your people in mind. For example, what level of technical or security expertise do they already have? And would short-form content work best for employees on the go? Considering these factors ensures you’re giving employees a strong foundation in security; one that helps reduce company-wide cybersecurity risks. 

“As employees grow more confident and security-aware, their training should grow with them. Providing timely, tailored content not only strengthens your company’s defenses but also shows employees that their time — and their learning — truly matter.”

Related Content

  1. Integration of Cybersecurity into Physical Security Realm
  2. eDiscovery and Cybersecurity: Protecting Sensitive Data Throughout Legal Proceedings
  3. Disaster Recovery Journal
    October is Cybersecurity Awareness Month

Recent Posts

ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

January 12, 2026

LambdaTest Rebrands to TestMu AI, the Agentic AI platform for Quality Engineering

January 12, 2026

The Workforce Has Changed; Disaster Recovery Must Change With It

January 9, 2026

Why Effective CTEM Must be an Intelligence-Led Program

January 9, 2026

Ridge Security Announces Powerful New AWS, Windows Pentesting Features for RidgeBot 6.0

January 9, 2026

Cybersecurity Nightmares of 2025 and the Path to Resilience in 2026

January 9, 2026

Archives

  • January 2026 (16)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Spring 2026 | The Future Runs on Resilience

    Leave your details below for a chance to win a free pass to DRJ Spring 2026 | The Future Runs on Resilience. The winner will be announced on January 16. Join us for DRJ's 74th Conference!
    Enter Now