CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 12, 2026

Is The SOC Obsolete, And We Just Haven’t Admitted It Yet?

Security Week Archived May 12, 2026 ✓ Full text saved

Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. The post Is The SOC Obsolete, And We Just Haven’t Admitted It Yet? appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    For decades, the Security Operations Center (SOC) has been the beating heart of enterprise defense. Analysts monitor dashboards, triage alerts, and investigate incidents around the clock. The SOC is often portrayed as the last line of defense—a place where intelligence meets action. And yet, if we are honest, the SOC as we know it is already obsolete. Not because analysts aren’t skilled or diligent, but because the very nature of cyber threats has changed faster than our operational models can keep up. The modern SOC is still largely a human-centric workflow. Analysts pivot between tools, manually enrich alerts, and painstakingly validate detection rules. Security vendors promise a revolution: an AI SOC capable of autonomous investigations, dramatically reduced workloads, and proactive threat response. In practice, these promises remain aspirational. In fact, Anton Chuvakin and Oliver Rochford recently co-authored When Marketing Fails, highlighting the gap between AI SOC marketing claims and reality. Based on vendor interactions, practitioner interviews, and SOC community OSINT, their report shows that while AI can assist SOC analysts, it rarely replaces human effort or autonomously resolves incidents. Analysts remain the bottleneck, and AI often lacks the contextual understanding required to make fully reliable decisions. Threat Actors Are Operating At Machine Speed Meanwhile, attackers are no longer constrained by traditional human limitations. In late 2025, Google’s Threat Intelligence Group confirmed that cybercriminals are already deploying AI‑powered malware that rewrites and adapts its own code during execution, marking a watershed shift in offensive capabilities. One notable example, PROMPTFLUX, uses real‑time interaction with Google’s Gemini model to dynamically regenerate its VBScript payload to evade detection and persistence mechanisms mid‑attack — a level of autonomous adaptation unseen in conventional malware families. Similarly, Anthropic reported disrupting what it described as one of the first large‑scale AI‑orchestrated cyber espionage campaigns, where an AI tool executed vast portions of an intrusion framework with minimal direct human intervention. Data from Google/Mandiant’s M‑Trends 2026 report shows that attackers are accelerating their operational tempo across the board, with exploitation increasingly occurring before patches are published and lateral movement hand‑offs collapsing to mere seconds (22 seconds to be exact!). And of course, while Anthropic’s Mythos Preview is still in the hands of defenders, it has demonstrated the ability to surface hundreds of defects in days that would normally take elite researchers months, and chain multiple low-levels into a single critical exploit. This means adversaries are now operating at near‑machine speed — adapting, targeting, and executing campaigns faster than traditional human‑centric SOC workflows can keep up. Can The Traditional SOC Keep Up? The foundation of AI-driven defense is complete, unfiltered data. Security teams must be able to ingest and analyze every relevant signal—including sensitive information such as source code, internal documents, and privileged communications—without compromising privacy, security, or organizational sovereignty. In this context, sovereignty means that the cybersecurity stack, data, and AI models remain fully under the organization’s control, with no reliance on third-party multi-tenant platforms that limit access or impose policy constraints. Only by having unrestricted access to both historical and current datasets can AI be applied effectively, enabling accurate detection, deep correlation, and meaningful long-term trend analysis. Once this foundation is in place, agentic AI capabilities—including explainability, auditability, and reproducibility—can function reliably. Analysts must understand why AI reaches specific conclusions, and every decision and action must be logged and reproducible for compliance and operational trust. Without full data access, these capabilities are superficial at best: AI decisions become opaque, incomplete, and prone to blind spots, leaving organizations vulnerable to fast, adaptive attacks. The limiting factor is not human skill—it is architecture. Many SOCs still rely on cloud-based SIEMs or XDR platforms where storage and compute costs force analysts to filter, truncate, or delete data. Privacy and sovereignty concerns often prevent certain datasets from being sent to the cloud for analysis. This creates blind spots that attackers readily exploit. Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. When AI can operate on the full dataset, and when actions are explainable, auditable, and reproducible, analysts can finally move beyond human-bottlenecked workflows. The SOC transforms into a truly adaptive, machine-speed defensive engine, capable of matching and outpacing AI-driven adversaries. The SOC Of the Future: Humans and AI Operating On Complete Data The SOC of the future will invert the current model. Signals will feed AI agents continuously, correlations will be drawn automatically, and human analysts will focus on oversight, exception handling, and strategic response. Humans will no longer chase alerts—they will guide autonomous systems, investigate the hardest problems, and make high-stakes decisions with confidence. The SOC is not failing because it is inherently flawed; it is obsolete because threats have evolved faster than the SOC architecture defending against them. Enterprises that acknowledge this reality and deploy data complete, AI-native security solutions for their SOC will be positioned to survive—and even thrive—against machine-speed adversaries. Related: Cyber Insights 2026: Threat Hunting in an Age of Automation and AI WRITTEN BY Danelle Au Danelle Au is a cybersecurity and AI go-to-market leader with 20+ years of experience bringing disruptive security, cloud, and AI technologies to market. She is currently VP of Product Marketing at Cylake. Danelle has held multiple CMO and VP roles across startups and market leaders—including Infoblox, Ordr, Blue Hexagon, SafeBreach, and Adallom—helping define emerging security categories and scale go-to-market engines. She is a co-founder and co-author, has multiple U.S. patents, and holds an M.S. in Electrical Engineering from UC Berkeley. The opinions and views expressed within her articles are those of Danelle alone in her personal capacity and do not necessarily reflect the positions of Cylake or any of her prior employers. More from Danelle Au From Ex Machina to Exfiltration: When AI Gets Too Curious Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy DNS: The Secret Weapon CISOs May Be Overlooking in the Fight Against Cyberattacks From Warnings to Action: Preparing America’s Infrastructure for Imminent Cyber Threats Seeing is Believing… and Securing Coming Soon to a Network Near You: More Shadow IoT Every “Thing” Everywhere All at Once What Deep Learning Means for CyberSecurity Latest News Claude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really Means TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack Frame Security Emerges From Stealth With $50M for Awareness and Training Platform Build Application Firewalls Aim to Stop the Next Supply Chain Attack Google Detects First AI-Generated Zero-Day Exploit Skoda Data Breach Hits Online Shop Customers Cloudflare Lays Off 1,100 Employees in AI-Driven Restructuring SailPoint Discloses GitHub Repository Hack Trending Webinar: ROSI For CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move Malwarebytes has named Chung Ip as Chief Financial Officer. Semperis has appointed John Podboy as Chief Information Security Officer. Randy Menon has become Chief Product and Marketing Officer at One Identity. More People On The Move Expert Insights The Mythos Moment: Enterprises Must Fight Agents With Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules Of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    May 12, 2026
    Archived
    May 12, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗