Guest: Steve Winterfeld (LinkedIn)
Company: Akamai
Show Name: CISO Insights
Topic: Security
Denial-of-service attacks should have been solved by now, yet 2025 saw botnets break records, with attack volumes almost double previous highs. As organizations rush to embrace APIs and generative AI, they are creating attack surfaces faster than they can secure them. Steve Winterfeld, Advisory CISO at Akamai, cuts through the noise to reveal what enterprise security leaders must actually focus on in 2026.
đš Going on record for 2026? We're recording the TFiR Prediction Series through mid-February. If you have a bold take on where AI Infrastructure, Cloud Native, or Enterprise IT is headingâwe want to hear it. [Reserve your slot
DDoS Attacks Reach Unprecedented Scale
For over a decade, Akamai has published its State of the Internet (SOTI) report, tracking threats across DDoS protection, API security, segmentation, and AI firewall technologies. The 2025 data reveals a troubling trend: DDoS attacks are not only persisting but evolving at an alarming rate.
âEvery year, it gets bigger and more complex, and now weâre seeing botnets setting new recordsâsignificantly higher than in the past, in some cases almost double previous records,â Winterfeld explains. The attacks span both traditional Layer 7 attacks against websites and Layer 3/4 attacks against infrastructure and DNS, with the latter setting the most new records.
The resurgence of previously dormant threats adds another dimension to the challenge. âMirai is a major botnet thatâs back. It resurfaced almost out of nowhere and is active again,â Winterfeld notes, highlighting how threat actors continuously adapt and revive proven attack methods.
APIs and AI Become Primary Attack Vectors
Following the money reveals where threats concentrate, and in 2025, that path led straight to APIs and generative AI. As customer engagement increasingly happens through APIs and AI-powered chatbots, threat actors have shifted their focus accordingly.
âThe threat follows the money, and the money follows engagement with peopleâand that engagement is increasingly done through APIs, and more and more through GenAI and chatbots,â Winterfeld observes. This evolution demands that organizations reassess their security priorities based on their specific business models.
For commerce companies, APIs represent the primary concern. High-tech organizations must prioritize generative AI security. Traditional manufacturing firms, unless they are actively adopting APIs or AI, should focus on ransomware prevention and network segmentation.
Tailoring Security Strategy to Business Reality
Rather than applying generic security recommendations, Winterfeld advocates for a business-first approach. âWe as cybersecurity professionalsâas you know, my perspective as a CIOâis that I have to understand how my organization is making revenue, what our business model is, and where our crown jewels are,â he emphasizes.
This strategic thinking extends beyond technology to encompass people, processes, and tools. Winterfeld shares a cautionary example: an engineer demanded that a DevOps team implement âfile integrity managementâ on their productâa request that made no technical sense. âWhat they should have said is, we need to figure out how to make sure we can audit what youâre doing,â he explains, illustrating how a lack of understanding can expose vulnerabilities.
The skills gap extends to emerging technologies like generative AI, where many security professionals lack the literacy to properly assess and mitigate risks. Organizations deploying GenAI need specific security tools designed for those unique threats, not retrofitted solutions from previous technology generations.
Navigating the Complex Compliance Landscape
The regulatory environment for AI and APIs continues to fragment across jurisdictions. In the EU, the Cyber Resilience Act focuses on IoT devices, introducing a new CE marking for cyber-safe products. The EU AI Act categorizes AI systems by risk levelâfrom âunacceptableâ (banned) to âminimalâ (no requirements)âwith particular attention to social scoring and manipulative AI systems.
Meanwhile, APIs often appear not as standalone regulations but nested within broader frameworks. âPCI 4.0 put out API requirements. DORA has API requirements, and so theyâre nested in other laws,â Winterfeld notes. In the United States, six states have already passed AI laws focused on transparency, bias prevention, and privacy, with more legislation pending.
Winterfeldâs advice is to build a solid security program first, then map it to compliance requirements. âThere are so many regulations out there. It makes more sense to build a solid security program and then map it to compliance. You may find you have a gap, and you may need to go cover that gap,â he says.
2026 Priorities: From Agentic AI to Post-Quantum Encryption
Looking ahead, several emerging threats and technologies demand attention. Agentic AI represents a new frontier, with OWASP releasing not only a Top 10 for large language models but also a separate Top 10 specifically for agentic AI systems.
Vibe codingâusing tools like ChatGPT to generate codeâpresents unexpected risks. Winterfeld recounts a peer, a cybersecurity expert, who used vibe coding to build an application but never instructed the AI to implement security measures. âI said, âWell, what did you tell it to do for security?â And he goes, âOh, well, I didnât,ââ Winterfeld recalls, demonstrating how even security professionals can overlook fundamental protections in the rush to adopt new tools.
Post-quantum cryptography preparation cannot wait. âStart to lean into post-quantum-safe certificates. Start building your infrastructure now, so when we get to quantum breaksâall that encryption that we depend onâweâve moved to encryption that is going to be safer in a quantum world,â Winterfeld urges.
Traditional concernsâthird-party risk, supply chain security, and hacktivismâremain relevant, though hacktivism increasingly serves as cover for state-sponsored operations. The geopolitical dimension of cyber threats will intensify as global conflicts continue.
Building Resilience Through Testing and Strategy
Beyond technology investments, organizations must update their risk portfolios and test their resilience. Do you have an API strategy? A GenAI strategy? Have you tested your resilience through different playbook scenarios and exercises?
âDo you have a good grasp of your situational awareness?â Winterfeld asks. He encourages security leaders to leverage established frameworks like OWASP, MITRE, and ISO standards rather than building from scratch. âItâs great to plagiarizeâgreat to leverage.â
His closing assessment captures the perpetual challenge facing security professionals: âItâs going to be another year of continuously fighting an innovative, adaptive, thoughtful cybercriminal ecosystem, so we just need to continue to do the right things.â





