CINS Army Brief

Mind the Gap: AI Attacks vs. Legacy Systems

Dec 22, 2025
Subscribe to our newsletter
By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Our Take

Ted Talks

What To Do With Legacy Systems

Looking back at November, there was a stark contrast in focus between the rise of AI in cyber attacks and the prevalence of old (vulnerable) legacy systems. In our experience, AI's influence is growing way faster than most organizations' ability to replace old systems. What to do? How about focusing on what's in between? MFA, Zero Trust, network segmentation, and our very own Outpost are some good tactical examples of how to shore up security while you're still dealing with the root of the problem.

Featured Article

Escalating Cyber Danger at the Edge

It’s been a tough time for “the edge,” as threat actors have made firewall vulnerabilities a particular target of their focus in the past few months. The edge is still vulnerable to traditional scans and exploits, and best-of-breed next-gen firewalls that take on those roles face real challenges on the modern edge.

Read About Firewall Vulnerabilities

In the News

In Other News