If Resolution #1 was about treating AI like production, Resolution #2 is about treating attackers like engineers: methodical, iterative, and very focused on whatever gets them paid fastest.
After watching the cyber security pendulum swing for the past couple decades, from IDS to IPS during my McAfee days, to endpoint “prevent everything” eras with Host IPS and Application Whitelisting (or allowlisting nowadays), then the long march into EDR/XDR and “detect & respond” vs. AI-based prevention, one pattern keeps repeating: prevention gets trendy, gets over promised, disappoints, and then comes roaring back when defenders realize they’re drowning in alerts and vulnerabilities (and many times can't keep up with attackers).
The problem isn’t prevention. It’s blanket prevention.
Trying to “prevent everything everywhere” is how security teams end up with brittle controls, angry users, and the false comfort of dashboards that look busy. Prevention works best when it’s scoped to what actually matters: crown jewels + the attack paths that lead to them.
And in 2026, those paths are getting more crowded.
Attack surfaces keep expanding (yeah, sounds cliché), CISOs and practitioners now need to think cloud, SaaS, identity sprawl, endpoints, edge and OT systems. At the same time, attackers have gotten pickier. They don’t “spray and pray” forever. They follow paths of least resistance toward assets that move the needle like privileged identities, critical apps, sensitive data stores, edge environments, and the systems that keep revenue flowing.
Meanwhile, defenders are squeezed by two forces that compound each other:
That’s why 2026 can’t just be “detect & respond, but faster.”
Resolution #2: Shift from “Detect & Respond” to “Predict & Prevent”
Start with your highest-impact attack paths.
Why This Matters
Traditional programs often run on a loop:
But when the threat landscape accelerates and your backlog grows, you start paying what we like to call the “unknowns tax”: time and money lost to surprises, blind spots, and incidents that never should’ve been possible in the first place.
A preemptive posture is a direct response to that reality:
So the new win condition becomes simple to state, but hard to do well:
Reduce the number of viable attacker moves on the paths that would cause material damage.
What To Do: Adopt the “3 Ds” Mindset (Deceive / Deny / Disrupt)
Think of this as a targeted preemptive program that combines:
Here’s how it breaks down.
1) Deceive: Make Attacker Progress Loud (and Expensive)
Deception isn’t about “cool bait servers.” Done right, it’s a signal amplifier, especially valuable when noise is your biggest enemy.
Where deception tends to work best:
Goal: Turn “unknown unknowns” into high-confidence, high-context alerts that are hard for an attacker to trigger accidentally.
Translation: if someone touches the wrong thing, you want it to be obviously wrong.
2) Deny: Remove the Easy Wins Around Crown Jewels
This is where “predict & prevent” earns credibility: deny the moves attackers actually use, not the ones we wish they’d use.
High-leverage denial controls:
Goal: Reduce feasible steps in the kill chain, especially around privilege escalation and data exfiltration.
Translation: If attackers can’t get privilege, can’t move laterally, and can’t get data out easily, they’re forced into noisier, riskier moves.
3) Disrupt: Break the Attacker’s Ability to Iterate
Disruption is about making your environment harder to “learn,” harder to replay, and harder to operationalize.
Examples that actually move the needle:
Goal: Shorten attacker dwell time and stop repeatable playbooks from working.
Translation: Attackers love predictability. Disruption is how you take it away.
What Leadership Cares About (and You Can Measure)
This approach isn’t a promise to stop all attacks. It’s a commitment to reduce business-impacting outcomes.
The outcomes that matter:
And the commitments you can state plainly:
TL;DR
“Detect & respond” will always be necessary. But if that’s your whole strategy in 2026, you’re volunteering to play defense at maximum disadvantage.
Treat attackers like engineers. Map the paths that matter. Then deceive, deny, and disrupt, starting where the business would feel it most.