{"id":7182,"date":"2025-07-23T22:15:45","date_gmt":"2025-07-24T02:15:45","guid":{"rendered":"https:\/\/hostingdiscussion.com\/news\/?p=7182"},"modified":"2025-07-23T22:15:15","modified_gmt":"2025-07-24T02:15:15","slug":"cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape","status":"publish","type":"post","link":"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/","title":{"rendered":"Cybersecurity transformed over five years as home networks and AI shape risk landscape"},"content":{"rendered":"<p data-start=\"103\" data-end=\"586\"><span id=\"input-sentence~0\">Today cybersecurity looks very different than it did five years ago, and Bernard\u202fMontel of <a href=\"https:\/\/www.tenable.com\/?x-clickref=1011lyyobKww&amp;x-promotion-id=afffiliate&amp;gad_source=1&amp;gad_campaignid=22410488799&amp;gbraid=0AAAAA9htJDLKR1G8B_3qwzfnKqNmI2eIb&amp;gclid=Cj0KCQjwkILEBhDeARIsAL--pjxtgeVf8r-Ibf72KUCXI-Nyix1lBFZHpO2KSus580ItL_Ra1rG7pr4aAnpVEALw_wcB\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Tenable<\/a> explains what\u2019s behind the shift. He says the pandemic changed everything: companies moved operations online overnight, and employees worked from home using unsecured routers that effectively expanded the corporate attack surface.<\/span><span id=\"input-sentence~1\"> While VPNs and MFA helped at first, the explosion of cloud services quickly replaced those stopgaps and reshaped how security teams protect environments.<\/p>\n<p>Montel points out that <a href=\"https:\/\/hostingdiscussion.com\/news\/emerging-threat-group-storm-0501-targets-hybrid-clouds-with-ransomware-backdoors\/\">ransomware<\/a> remains the top threat. Breaches now routinely break records for data volume, and attackers steal and encrypt information.<\/span><span id=\"input-sentence~2\"> At the same time, increasingly <a href=\"https:\/\/hostingdiscussion.com\/news\/park-place-makes-bold-bet-on-cloud-complexity-with-csi-acquisition\/\">complex cloud<\/a> environments challenge traditional perimeter-based security. In response, identity now serves as the frontline of defense. Enterprise environments now juggle federated identities across Active Directory, EntraID, AWS, Azure, and GCP\u2014and organizations must protect that sprawling digital identity fabric.<\/span><span id=\"input-sentence~3\"><\/p>\n<p>Meanwhile, AI emerges as both a threat and a defense tool. On one hand, attackers now use generative tools to automate attacks. On the other, security teams can deploy AI platforms such as GPT\u20114 and Vertex AI to accelerate threat research, pattern detection, and decision-making.<\/span><span id=\"input-sentence~4\"> Montel emphasizes that defenders who adopt AI intelligently can analyze threats faster and respond more effectively. Yet they must remain vigilant against attackers who exploit those same capabilities.<\/p>\n<p>He also stresses that many incidents begin with known vulnerabilities or human error.<\/span><span id=\"input-sentence~5\"> Attackers exploit misconfigurations, outdated systems, or default settings with ease. As a result, even small businesses should not assume they stay under the radar\u2014threat actors often target supply chain partners to infiltrate larger networks. Montel warns that misconfigurations left unchecked become open doors for attackers.<\/span><span id=\"input-sentence~6\"><\/p>\n<p>Montel recommends organizations shift from reactive detection to proactive exposure management. They should first identify their most significant vulnerabilities, prioritize patching or configuration updates, and then monitor for unusual behavior. He explains that today\u2019s threats move quickly, so chasing after attackers is inefficient\u2014but closing the most significant gaps up front builds a stronger defense.<\/span><span id=\"input-sentence~7\"><\/p>\n<p>Ultimately, he says, the mix of remote work, hybrid cloud, ransomware evolution, complex identity environments, and AI use demand a more proactive and layered security strategy. However steadily organizations adopt post\u2011pandemic learnings\u2014such as exposure scanning, identity verification, and AI\u2011driven analysis\u2014they position themselves better to confront emerging threats head\u2011on.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today cybersecurity looks very different than it did five years ago, and Bernard\u202fMontel of Tenable explains what\u2019s behind the shift. He says the pandemic changed everything: companies moved operations online overnight, and employees worked from home using unsecured routers that effectively expanded the corporate attack surface. While VPNs and MFA helped at first, the explosion [&hellip;]<\/p>\n","protected":false},"author":20624,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[1833,93,4052,80,4055,4054,4053],"class_list":["post-7182","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-ai","tag-cloud","tag-cloud-security-trends","tag-cybersecurity","tag-generative-ai-defense","tag-identity-management","tag-ransomware-risk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity transformed over five years as home networks and AI shape risk landscape - Web Hosting News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity transformed over five years as home networks and AI shape risk landscape - Web Hosting News\" \/>\n<meta property=\"og:description\" content=\"Today cybersecurity looks very different than it did five years ago, and Bernard\u202fMontel of Tenable explains what\u2019s behind the shift. He says the pandemic changed everything: companies moved operations online overnight, and employees worked from home using unsecured routers that effectively expanded the corporate attack surface. While VPNs and MFA helped at first, the explosion [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"Web Hosting News\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-24T02:15:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-24T02:15:15+00:00\" \/>\n<meta name=\"author\" content=\"Justine Juyad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Justine Juyad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/\",\"url\":\"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/\",\"name\":\"Cybersecurity transformed over five years as home networks and AI shape risk landscape - Web Hosting News\",\"isPartOf\":{\"@id\":\"https:\/\/hostingdiscussion.com\/news\/#website\"},\"datePublished\":\"2025-07-24T02:15:45+00:00\",\"dateModified\":\"2025-07-24T02:15:15+00:00\",\"author\":{\"@id\":\"https:\/\/hostingdiscussion.com\/news\/#\/schema\/person\/3a1732732b90f8c57c2a0ec68d3c49e3\"},\"breadcrumb\":{\"@id\":\"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hostingdiscussion.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity transformed over five years as home networks and AI shape risk landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hostingdiscussion.com\/news\/#website\",\"url\":\"https:\/\/hostingdiscussion.com\/news\/\",\"name\":\"Web Hosting News\",\"description\":\"Cloud and web hosting industry daily news\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hostingdiscussion.com\/news\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hostingdiscussion.com\/news\/#\/schema\/person\/3a1732732b90f8c57c2a0ec68d3c49e3\",\"name\":\"Justine Juyad\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hostingdiscussion.com\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/96df33d01870f85226adf8492251fbefe00bc349b10bb7679b094f3fa086999c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/96df33d01870f85226adf8492251fbefe00bc349b10bb7679b094f3fa086999c?s=96&d=mm&r=g\",\"caption\":\"Justine Juyad\"},\"description\":\"HostingDiscussion.com senior reporter\",\"sameAs\":[\"https:\/\/hostingdiscussion.com\/news\/\"],\"url\":\"https:\/\/hostingdiscussion.com\/news\/author\/justine-juyad\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity transformed over five years as home networks and AI shape risk landscape - Web Hosting News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity transformed over five years as home networks and AI shape risk landscape - Web Hosting News","og_description":"Today cybersecurity looks very different than it did five years ago, and Bernard\u202fMontel of Tenable explains what\u2019s behind the shift. He says the pandemic changed everything: companies moved operations online overnight, and employees worked from home using unsecured routers that effectively expanded the corporate attack surface. While VPNs and MFA helped at first, the explosion [&hellip;]","og_url":"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/","og_site_name":"Web Hosting News","article_published_time":"2025-07-24T02:15:45+00:00","article_modified_time":"2025-07-24T02:15:15+00:00","author":"Justine Juyad","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Justine Juyad","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/","url":"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/","name":"Cybersecurity transformed over five years as home networks and AI shape risk landscape - Web Hosting News","isPartOf":{"@id":"https:\/\/hostingdiscussion.com\/news\/#website"},"datePublished":"2025-07-24T02:15:45+00:00","dateModified":"2025-07-24T02:15:15+00:00","author":{"@id":"https:\/\/hostingdiscussion.com\/news\/#\/schema\/person\/3a1732732b90f8c57c2a0ec68d3c49e3"},"breadcrumb":{"@id":"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hostingdiscussion.com\/news\/cybersecurity-transformed-over-five-years-as-home-networks-and-ai-shape-risk-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hostingdiscussion.com\/news\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity transformed over five years as home networks and AI shape risk landscape"}]},{"@type":"WebSite","@id":"https:\/\/hostingdiscussion.com\/news\/#website","url":"https:\/\/hostingdiscussion.com\/news\/","name":"Web Hosting News","description":"Cloud and web hosting industry daily news","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hostingdiscussion.com\/news\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/hostingdiscussion.com\/news\/#\/schema\/person\/3a1732732b90f8c57c2a0ec68d3c49e3","name":"Justine Juyad","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hostingdiscussion.com\/news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/96df33d01870f85226adf8492251fbefe00bc349b10bb7679b094f3fa086999c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96df33d01870f85226adf8492251fbefe00bc349b10bb7679b094f3fa086999c?s=96&d=mm&r=g","caption":"Justine Juyad"},"description":"HostingDiscussion.com senior reporter","sameAs":["https:\/\/hostingdiscussion.com\/news\/"],"url":"https:\/\/hostingdiscussion.com\/news\/author\/justine-juyad\/"}]}},"views":283,"_links":{"self":[{"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/posts\/7182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/users\/20624"}],"replies":[{"embeddable":true,"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/comments?post=7182"}],"version-history":[{"count":1,"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/posts\/7182\/revisions"}],"predecessor-version":[{"id":7183,"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/posts\/7182\/revisions\/7183"}],"wp:attachment":[{"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/media?parent=7182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/categories?post=7182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hostingdiscussion.com\/news\/wp-json\/wp\/v2\/tags?post=7182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}