Mind the Gap: AI Attacks vs. Legacy Systems
Our Take

Ted Talks
What To Do With Legacy Systems
Looking back at November, there was a stark contrast in focus between the rise of AI in cyber attacks and the prevalence of old (vulnerable) legacy systems. In our experience, AI's influence is growing way faster than most organizations' ability to replace old systems. What to do? How about focusing on what's in between? MFA, Zero Trust, network segmentation, and our very own Outpost are some good tactical examples of how to shore up security while you're still dealing with the root of the problem.
Featured Article
Escalating Cyber Danger at the Edge

It’s been a tough time for “the edge,” as threat actors have made firewall vulnerabilities a particular target of their focus in the past few months. The edge is still vulnerable to traditional scans and exploits, and best-of-breed next-gen firewalls that take on those roles face real challenges on the modern edge.
Read About Firewall Vulnerabilities
In the News
In Other News
- With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech (Wired)
- How to automate identity lifecycle management for legacy and on-prem apps (SC World)
- Why Legacy Web Forms Put Life Sciences Organizations At Critical Risk (Pharmaceutical Online)
- CISOs must prove the business value of cyber — the right metrics can help (CSO Online)
- Enterprises are losing track of the devices inside their networks (HelpNet Security)
- Google says 2026 will be the year AI supercharges cybercrime (HelpNet Security)



