{"id":12566,"date":"2025-11-17T07:24:08","date_gmt":"2025-11-17T15:24:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12566"},"modified":"2025-11-17T11:12:59","modified_gmt":"2025-11-17T19:12:59","slug":"whats-on-the-it-horizon-for-2026-our-experts-weigh-in","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/","title":{"rendered":"What\u2019s on the IT horizon for 2026? Our Experts Weigh In."},"content":{"rendered":"<p>2025 has proven itself to be a groundbreaking year for networking, security and cloud. With the proliferation of AI technologies, new global regulations and the growing complexity of cloud infrastructure, IT teams have found themselves on constantly shifting sands. <\/p>\n<p>That state of flux is only set to accelerate in 2026. IT teams shouldn\u2019t just try to weather the storm; they need to be dynamic and adaptive, leaning into new approaches and continuously staying ahead of emerging threats.  <\/p>\n<p>To help teams prepare for what\u2019s next, our Infoblox experts shared their predictions for how the IT landscape will evolve in 2026. <\/p>\n<h3>AI-Driven Threats Reshape the Cyber Battlefield<\/h3>\n<p>\n<strong>Scott Harrell, Chief Executive Officer <\/strong><br \/>\nThe mass personalization of cyberattacks will disrupt the classical kill chain model, making it more challenging for security teams to predict and prevent attacks\u2014and making it more likely organizations will be patient zero. With AI, attackers can tailor their strategies to target specific individuals or organizations, rendering traditional defense mechanisms less effective. This shift will require security teams to develop new approaches to detect and mitigate highly personalized threats. <\/p>\n<p><strong>Brad Rinklin, Chief Marketing Officer <\/strong><br \/>\nPolymorphic and sentient malware will become more prevalent, posing a significant threat to cybersecurity. This type of malware will be capable of changing its code and behavior to avoid detection, making it harder for security systems to identify and neutralize it. The emergence of sentient malware will mark a new era in cyberthreats, where AI-driven attacks become increasingly sophisticated and resilient. It\u2019s critical to invest in advanced detection and response capabilities to stay ahead of these evolving threats.<\/p>\n<p><strong>Craig Sanderson, Principal Cybersecurity Strategist <\/strong><br \/>\nThe hyper-personalization of attacks, as seen in Japan, will become more prevalent, making it harder to defend against targeted threats. Attackers will increasingly tailor their strategies to specific individuals or organizations, rendering traditional defense mechanisms less effective. This trend will require security teams to develop new approaches to detect and mitigate highly personalized threats. The challenge will be to stay one step ahead of attackers who are becoming more sophisticated in their methods. The obvious technological shift will be the use of AI in threat intelligence generation and a new approach that targets the infrastructure threat actors use, rather than targeting each campaign. <\/p>\n<h3>Cybercrime-as-a-Service and the Democratization of Attacks<\/h3>\n<p><strong>Coleman Mehta, Head of Global Public Policy and Strategy <\/strong><br \/>\nIn 2026, the ease of executing attacks without technical proficiency will lead to an increase in cyberthreats. As attack tools become more user-friendly, individuals who previously lacked the skills to launch cyberattacks will now be able to do so. This will result in a surge of cyberthreats. The democratization of cyberattack capabilities will pose a significant challenge for global cybersecurity efforts. <\/p>\n<p><strong>Chris Usserman, Global Public Sector Chief Technology Officer <\/strong><br \/>\nCybercrime-as-a-service will supercharge financially motivated threat actors. Financially motivated groups are no longer limited by their in-house skills, largely fueled by an AI-enabled ecosystem. In 2026, they\u2019ll further expand their capabilities by tapping into a maturing cybercrime-as-a-service ecosystem, outsourcing everything from exploit kits to credential dumps and initial access brokers. This further industrialization of cybercrime will continue to blur the line between opportunistic and highly skilled adversaries, accelerating the pace and impact of financially motivated attacks. <\/p>\n<p><strong>John Wojcik, Senior Threat Researcher<\/strong><br \/>\nIn 2026, we will see a significant acceleration of automation within the cyber-enabled fraud industry in Southeast Asia. This region will face substantial challenges as cybercriminals and scam centers respond to mounting law enforcement pressure by increasing their rate of AI-driven tool adoption and integration amidst disruptions within their human labor supply chains. The use of deepfake software suites and jailbroken large language models for social engineering will become more prevalent, making it increasingly difficult to detect and prevent fraud. This shift will require a concerted effort to detect, let alone address and mitigate the growing threats. <\/p>\n<h3>The Rise of Autonomous Systems and Agentic Operations<\/h3>\n<p><strong>Scott Harrell, Chief Executive Officer <\/strong><br \/>\nAs cloud infrastructure grows more dynamic and complex, the traditional human-led troubleshooting model is reaching its limits. Even without AI, the sheer scale and fluidity of modern cloud environments, combined with intricate networking and security layers, already challenge human comprehension. Add intelligent agents into the mix, and we\u2019re entering a world where machines not only detect anomalies faster than humans but also resolve them in ways that are too fast, too subtle and too interconnected for manual intervention. This represents a paradigm shift where human troubleshooting becomes obsolete and trust in autonomous systems becomes essential. <\/p>\n<p><strong>Danelle Au, Vice President, Product Marketing <\/strong><br \/>\nIn 2026, SOC teams will increasingly use AI to reduce the burden on analysts, improving efficiency and effectiveness. By automating routine tasks like triage, forensic collection and real-time data correlation, AI will allow analysts to focus on more complex and strategic issues. The integration of AI into SOCs will be a game-changer for the cybersecurity industry. <\/p>\n<p><strong>Faraz Aladin, Vice President, Technical Marketing <\/strong><br \/>\nSecurity teams will need to undergo a mindset shift to fully utilize the capabilities of AI and stay ahead of emerging threats. Embracing AI as a critical component of our security strategy will be essential in addressing the increasing sophistication of cyberthreats. This shift will involve continuous learning and adaptation to keep up with the rapidly evolving technology landscape. By fully leveraging AI, we can enhance our defenses and better protect against future threats. <\/p>\n<h3>The Expanding Attack Surface: IoT, Cloud and Supply Chain Vulnerabilities<\/h3>\n<p><strong>Scott Harrell, Chief Executive Officer <\/strong><br \/>\nIoT devices will become a bigger target for attacks due to the ease of creating and deploying attacks against them. The proliferation of IoT devices in homes and businesses presents an opportunity for attackers to get persistent footholds from which they can pivot and launch attacks or wreak havoc and create disruption of operations. With AI, it will be more attractive to develop and execute attacks on these devices, leading to an increase in IoT-related security incidents. <\/p>\n<p><strong>Dr. Ren\u00e9e Burton, Head of Infoblox Threat Intel <\/strong><br \/>\nThe adoption of cloud services for all aspects of businesses combined with the necessity to maintain accurate DNS records for these services will continue to expose enterprises to risks, including brand reputation and compromise of their own systems. These attacks are most often via dangling DNS records and are ones already experienced by most large enterprises. <\/p>\n<p><strong>Chris Usserman, Global Public Sector Chief Technology Officer <\/strong><br \/>\nThreat actors will increasingly target third-party vendors and managed services, especially those with embedded access to customer environments. Compromising a single solution provider can provide immediate access to hundreds of downstream organizations. This \u201cone-to-many\u201d attack model, seen in recent supply chain breaches, will drive demand for implementing comprehensive Zero Trust principles, calls for tighter vendor vetting (i.e., product certifications) and extending continuous monitoring of partner activity. <\/p>\n<h3>DNS as the Foundation of Cyber Resilience<\/h3>\n<p><strong>Cricket Liu, Executive Vice President and Chief Evangelist <\/strong><br \/>\nGovernments worldwide will increasingly mandate or strongly recommend the use of Protective DNS services as part of national cybersecurity strategies. This will be especially prevalent in sectors deemed critical infrastructure\u2014such as healthcare, energy and finance\u2014where threats can have outsized impacts. <\/p>\n<p>Protective DNS technologies will become more intelligent, incorporating behavioral analytics, machine learning and real-time traffic flow analysis. Instead of simply blocking known malicious domains, systems will detect anomalies in DNS queries\u2014such as unusual query volumes, timing patterns or geographic inconsistencies\u2014that may indicate command-and-control activity or data exfiltration. <\/p>\n<p><strong>Dr. Ren\u00e9e Burton, Head of Infoblox Threat Intel <\/strong><br \/>\nThough attackers will become faster and more sophisticated by using language models and deepfakes, DNS remains constant. It doesn\u2019t care about these advancements. This makes DNS security more vital than ever to protect against these evolving threats. Ensuring robust DNS security will be crucial in safeguarding digital infrastructure. <\/p>\n<h3>Balancing Security, Usability and Regulation<\/h3>\n<p><strong>Mukesh Gupta, Chief Product Officer <\/strong><br \/>\nBalancing security and usability will remain a significant challenge. While robust security measures are essential, organizations should not compromise the user experience. Striking the right balance between security and usability is crucial to ensure that customers feel secure without being inconvenienced. This balance is particularly important in banking, where user trust and satisfaction are paramount. <\/p>\n<p><strong>Ed Hunter, Senior Director, Information Security<\/strong><br \/>\nThe tension between security and privacy will remain a central issue in 2026. Data governance\u2014who owns data, how it\u2019s used and under what conditions\u2014will continue to evolve, with Europe leading the way through progressive legislation. Expect new laws and frameworks to emerge globally as governments grapple with the implications of AI-driven data processing. <\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:10px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\ntable {\n    font-size: 16px;\n    word-break: keep-all;\n}\n.calloutbox td {\n    padding: 20px;\n    font-size: 18px;\n}\nh3{\n    margin-bottom: 15px;\n    font-size: 24px;\n    color: #101820;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">What\u2019s on the IT horizon for 2026?<\/span> Our Experts Weigh In.');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2025 has proven itself to be a groundbreaking year for networking, security and cloud. With the proliferation of AI technologies, new global regulations and the growing complexity of cloud infrastructure, IT teams have found themselves on constantly shifting sands. That state of flux is only set to accelerate in 2026. IT teams shouldn\u2019t just try [&hellip;]<\/p>\n","protected":false},"author":419,"featured_media":12567,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[1182,1438,1439,1440,1441],"class_list":{"0":"post-12566","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ai-in-cybersecurity","9":"tag-it-trends-2026","10":"tag-dns-security-resilience","11":"tag-cybercrime-as-a-service","12":"tag-security-vs-usability-regulationegulation","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience &amp; Regulatory Shifts<\/title>\n<meta name=\"description\" content=\"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience &amp; Regulatory Shifts\" \/>\n<meta property=\"og:description\" content=\"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-17T15:24:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T19:12:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ariel Roop\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience &amp; Regulatory Shifts\" \/>\n<meta name=\"twitter:description\" content=\"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ariel Roop\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/\"},\"author\":{\"name\":\"Ariel Roop\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f457708d18e527c8a1c3d909baeafc2\"},\"headline\":\"What\u2019s on the IT horizon for 2026? Our Experts Weigh In.\",\"datePublished\":\"2025-11-17T15:24:08+00:00\",\"dateModified\":\"2025-11-17T19:12:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/\"},\"wordCount\":1414,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-2026-predictions-thumbnail.jpeg\",\"keywords\":[\"AI in Cybersecurity\",\"IT Trends 2026\",\"DNS Security &amp; Resilience\",\"Cybercrime-as-a-Service\",\"Security vs. Usability &amp; Regulationegulation\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/\",\"name\":\"IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience & Regulatory Shifts\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-2026-predictions-thumbnail.jpeg\",\"datePublished\":\"2025-11-17T15:24:08+00:00\",\"dateModified\":\"2025-11-17T19:12:59+00:00\",\"description\":\"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-2026-predictions-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Blog-2026-predictions-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What\u2019s on the IT horizon for 2026? Our Experts Weigh In.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f457708d18e527c8a1c3d909baeafc2\",\"name\":\"Ariel Roop\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/ariel-roop-thumbnail-96x96.jpeg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/ariel-roop-thumbnail-96x96.jpeg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/ariel-roop-thumbnail-96x96.jpeg\",\"caption\":\"Ariel Roop\"},\"description\":\"Ariel Roop leads global corporate communications at Infoblox, where she drives the company\u2019s strategic voice across public relations, analyst relations, and social media. Working closely with marketing leaders, and broader product and threat research teams, Ariel helps shape the narrative around Infoblox\u2019s leadership in UDDI, preemptive security, and the power of unifying networking and security on the Infoblox Protective DDI Platform.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/ariel-roop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience & Regulatory Shifts","description":"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/","og_locale":"en_US","og_type":"article","og_title":"IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience & Regulatory Shifts","og_description":"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/","og_site_name":"Infoblox Blog","article_published_time":"2025-11-17T15:24:08+00:00","article_modified_time":"2025-11-17T19:12:59+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Ariel Roop","twitter_card":"summary_large_image","twitter_title":"IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience & Regulatory Shifts","twitter_description":"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg","twitter_misc":{"Written by":"Ariel Roop","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/"},"author":{"name":"Ariel Roop","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4f457708d18e527c8a1c3d909baeafc2"},"headline":"What\u2019s on the IT horizon for 2026? Our Experts Weigh In.","datePublished":"2025-11-17T15:24:08+00:00","dateModified":"2025-11-17T19:12:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/"},"wordCount":1414,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg","keywords":["AI in Cybersecurity","IT Trends 2026","DNS Security &amp; Resilience","Cybercrime-as-a-Service","Security vs. Usability &amp; Regulationegulation"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/","url":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/","name":"IT Predictions for 2026: AI Threats, Cybercrime-as-a-Service, DNS Resilience & Regulatory Shifts","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg","datePublished":"2025-11-17T15:24:08+00:00","dateModified":"2025-11-17T19:12:59+00:00","description":"Explore Infoblox experts\u2019 predictions for 2026: AI-driven cyber threats, DNS as the cornerstone of cyber resilience and the evolving balance between security, usability and global regulations. Stay ahead of the next wave of IT challenges.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Blog-2026-predictions-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/whats-on-the-it-horizon-for-2026-our-experts-weigh-in\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"What\u2019s on the IT horizon for 2026? Our Experts Weigh In."}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/4f457708d18e527c8a1c3d909baeafc2","name":"Ariel Roop","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ariel-roop-thumbnail-96x96.jpeg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ariel-roop-thumbnail-96x96.jpeg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ariel-roop-thumbnail-96x96.jpeg","caption":"Ariel Roop"},"description":"Ariel Roop leads global corporate communications at Infoblox, where she drives the company\u2019s strategic voice across public relations, analyst relations, and social media. Working closely with marketing leaders, and broader product and threat research teams, Ariel helps shape the narrative around Infoblox\u2019s leadership in UDDI, preemptive security, and the power of unifying networking and security on the Infoblox Protective DDI Platform.","url":"https:\/\/www.infoblox.com\/blog\/author\/ariel-roop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/419"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12566"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12566\/revisions"}],"predecessor-version":[{"id":12575,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12566\/revisions\/12575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12567"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}