{"id":13660,"date":"2026-05-19T07:55:48","date_gmt":"2026-05-19T14:55:48","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=13660"},"modified":"2026-05-18T11:22:15","modified_gmt":"2026-05-18T18:22:15","slug":"what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/","title":{"rendered":"What 550 Security Leaders Just Told Us about the Age of AI, and Why Preemptive Digital Risk Protection Can\u2019t Wait"},"content":{"rendered":"<p>The attack surface isn\u2019t just expanding. It\u2019s outrunning the security models built to defend it. That\u2019s the clearest takeaway from <a href=\"https:\/\/info.infoblox.com\/resources-reports-securing-the-expanding-attack-surface-in-the-age-of-ai\"><strong>Securing the Expanding Attack Surface in the Age of AI<\/strong><\/a>, a new Infoblox research report based on a global survey of 550 cybersecurity professionals across 10 countries and six critical industries.<\/p>\n<p>The data will feel familiar to anyone inside a security organization right now: more exposure, more AI-driven attacks, more tooling and still not enough real risk reduction. Security leaders are no longer debating whether to shift toward preemptive, intelligence-driven security; they\u2019re doing it, and they\u2019re looking for solutions that can disrupt threats before they reach users, customers and brands, especially the ones that originate outside the enterprise perimeter. This is exactly the problem <a href=\"https:\/\/www.infoblox.com\/news\/news-events\/press-releases\/infoblox-completes-axur-acquisition-expands-preemptive-security-to-stop-external-threats-at-the-source\/\">Infoblox acquired Axur to solve<\/a>, and why we\u2019re scaling Axur\u2019s proven capabilities globally as Digital Risk Protection Services (DRPS), part of Infoblox Exposure Management.<\/p>\n<h3>The Signals Are Hard to Ignore<\/h3>\n<p>A few numbers from the report stand out for how they connect:<\/p>\n<ul class=\"list-spacing\">\n<li><strong>96%<\/strong> of organizations report challenges managing threat exposure as cloud, software as a service (SaaS), IoT\/OT and shadow IT grow faster than teams can inventory.<\/li>\n<li><strong>87%<\/strong> have already experienced adversarial AI-driven attacks, most commonly AI-driven phishing (61%) and AI-crafted malware (51%).<\/li>\n<li><strong>43%<\/strong> now rank deepfakes and AI-generated phishing as their top threat concern, surpassing ransomware (29%).<\/li>\n<li><strong>More than half<\/strong> prioritize phishing infrastructure takedown and credential leak detection as their most critical digital risk protection use cases.<\/li>\n<li><strong>67%<\/strong> cite poor DNS hygiene as an exposure concern, and <strong>88%<\/strong> report additional exposure concerns tied to misconfigured or unmanaged DNS.<\/li>\n<li><strong>82%<\/strong> have increased their use of preemptive security tools year over year.<\/li>\n<\/ul>\n<p>The biggest challenge isn\u2019t finding vulnerabilities. It\u2019s knowing which ones are actually exploitable in the real world (34%), compounded by budget constraints (29%), fragmented tooling (28%) and gaps in intelligence, skills and tooling that leave over half of teams overwhelmed by the pace of AI-driven threats. Meanwhile, attackers have industrialized everything outside the perimeter, standing up convincing phishing, fake apps and impersonation campaigns faster than manual defenses can respond. Organizations don\u2019t need more alerts about external threats. They need those threats disrupted before they reach their users and customers.<\/p>\n<h3>Preemptive Security Is Becoming the Operating Model<\/h3>\n<p>Security leaders are moving decisively toward preemptive, intelligence-driven approaches. Prevention (43%) and predictive threat intelligence (39%) lead the list of most appealing preemptive concepts, with AI-assisted security operations (36%) close behind. Organizations expect preemptive tools to account for <strong>49%<\/strong> of their security tool mix over the next 12 months, up an average of <strong>12%<\/strong> year over year, and they want those tools to plug into workflows they already run, with security information and event management (SIEM)\/security orchestration, automation and response (SOAR) integration (32%) and executive-friendly reporting (30%) ranked as the highest-value additions to digital risk and exposure management solutions.<\/p>\n<h3>Why We Acquired Axur, and Why Now<\/h3>\n<p>When a market tells you that damaging attacks begin outside the enterprise, that AI has made them faster and more convincing, and that perimeter controls aren\u2019t built to disrupt the infrastructure that creates them, you have two choices: wait or accelerate. We accelerated.<\/p>\n<p>Axur was purpose-built for this problem, continuously discovering brand abuse, phishing infrastructure, impersonation, fraud and credential exposure across the open web, social, ads, app stores, marketplaces and the deep and dark web, then automating evidence-backed takedowns end to end. The metrics tell the story: <strong>sub-four-minute<\/strong> first notifications to internet service providers after a threat is detected, <strong>nine-hour<\/strong> median takedown times after those notifications are sent, a <strong>98.9%<\/strong> success rate in removing attacks permanently, <strong>86%<\/strong> of takedowns automated with no human involvement required and <strong>15-day stay-down<\/strong> monitoring to prevent reappearance.<\/p>\n<p>For the full acquisition rationale and the \u201cbetter together\u201d vision, see Scott Harrell\u2019s <a href=\"https:\/\/www.infoblox.com\/blog\/company\/why-the-axur-acquisition-marks-a-turning-point-for-preemptive-security\/\">Why the Axur Acquisition Marks a Turning Point for Preemptive Security<\/a> and Mukesh Gupta\u2019s <a href=\"https:\/\/www.infoblox.com\/blog\/security\/preemptive-threat-disruption-at-scale-how-infoblox-and-axur-turn-external-risk-into-protection\/\">deep dive on turning external risk into protection at scale<\/a>.<\/p>\n<h3>How Digital Risk Protection Services Maps to What the Research Says Teams Need<\/h3>\n<p>The survey is, in many ways, a blueprint for what Digital Risk Protection Services, the first offering within Infoblox Exposure Management, is designed to do.<\/p>\n<ul class=\"list-spacing\">\n<li><strong>On the top digital risk priorities, such as phishing takedown, credential leak detection and AI-evasive impersonation: <\/strong>Digital Risk Protection Services continuously discovers external threats, validates real abuse with multi-modal AI that catches impersonation keyword- and domain-similarity tools miss, and automates takedowns across web, social, ads, apps and the deep and dark web.<\/li>\n<li><strong>On DNS hygiene and the compressed window between exposure and impact:<\/strong> Paired with Protective DNS, part of Infoblox Threat Defense\u2122, Digital Risk Protection Services delivers \u201cinstant block + fast takedown,\u201d a combination no one else brings to market, so managed users are protected in minutes while attacker infrastructure is removed, and DNS intelligence expands visibility into the related infrastructure behind each discovered threat.<\/li>\n<li><strong>On integration, reporting and measurable outcomes:<\/strong> Digital Risk Protection Services plugs into existing SIEM\/SOAR and incident workflows with proof-rich evidence and audit-ready reporting, and it extends into a broader exposure management strategy with External Attack Surface Management (EASM) and Cyber Asset Attack Surface Management (CAASM) as the next phases.<\/li>\n<\/ul>\n<h3>The Takeaway for Security Leaders<\/h3>\n<p>The expanding attack surface, the normalization of AI-driven attacks, the persistent gap between vulnerability data and real-world exploitability, and the sharp move toward preemptive control all point in the same direction: the programs that succeed will be the ones that disrupt external threats earlier, enforce protection immediately and prove real risk reduction. That\u2019s exactly what Digital Risk Protection Services is built to deliver at global scale.<\/p>\n<p><a href=\"https:\/\/info.infoblox.com\/resources-reports-securing-the-expanding-attack-surface-in-the-age-of-ai\"><strong>Download the Securing the Expanding Attack Surface in the Age of AI report<\/strong><\/a> for the full findings, then <a href=\"https:\/\/info.infoblox.com\/contact-sales\">talk to us<\/a> about how Digital Risk Protection Services can help you act on what the research tells you.<\/p>\n<style>\n.code-format {\nfont-family: 'Courier New';}.image-caption {    font-size: 12px;}.list-spacing li{margin-bottom:20px}ol.list-spacing > li::marker {    font-weight: 700;}.entry-content ul.list-spacing ul > li {    list-style-type: square;}<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">What 550 Security Leaders Just Told Us about the Age of AI<\/span>, and Why Preemptive Digital Risk Protection Can\u2019t Wait');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The attack surface isn\u2019t just expanding. It\u2019s outrunning the security models built to defend it. That\u2019s the clearest takeaway from Securing the Expanding Attack Surface in the Age of AI, a new Infoblox research report based on a global survey of 550 cybersecurity professionals across 10 countries and six critical industries. The data will feel [&hellip;]<\/p>\n","protected":false},"author":443,"featured_media":13661,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1693,1200,1694,1695,1696,1697],"class_list":{"0":"post-13660","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-ai-driven-cyber-attacks","9":"tag-preemptive-security","10":"tag-digital-risk-protection","11":"tag-ai-generated-phishing","12":"tag-adversarial-ai-attacks","13":"tag-deepfake-cybersecurity-threats","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>550 Security Leaders on AI Threats &amp; Digital Risk Protection AI-Driven Threats &amp; Preemptive Security: Key Findings from 550 Leaders | Infoblox<\/title>\n<meta name=\"description\" content=\"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"550 Security Leaders on AI Threats &amp; Digital Risk Protection AI-Driven Threats &amp; Preemptive Security: Key Findings from 550 Leaders | Infoblox\" \/>\n<meta property=\"og:description\" content=\"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-19T14:55:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daniel Brody\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"550 Security Leaders on AI Threats &amp; Digital Risk Protection AI-Driven Threats &amp; Preemptive Security: Key Findings from 550 Leaders | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Brody\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/\"},\"author\":{\"name\":\"Daniel Brody\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/af35a4a3b46e9c55760b9cafce573bb0\"},\"headline\":\"What 550 Security Leaders Just Told Us about the Age of AI, and Why Preemptive Digital Risk Protection Can\u2019t Wait\",\"datePublished\":\"2026-05-19T14:55:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/\"},\"wordCount\":968,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/drps-report-blog-thumbnail.jpeg\",\"keywords\":[\"AI-driven cyber attacks\",\"preemptive security\",\"digital risk protection\",\"AI-generated phishing\",\"adversarial AI attacks\",\"deepfake cybersecurity threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/\",\"name\":\"550 Security Leaders on AI Threats & Digital Risk Protection AI-Driven Threats & Preemptive Security: Key Findings from 550 Leaders | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/drps-report-blog-thumbnail.jpeg\",\"datePublished\":\"2026-05-19T14:55:48+00:00\",\"description\":\"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/drps-report-blog-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/drps-report-blog-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What 550 Security Leaders Just Told Us about the Age of AI, and Why Preemptive Digital Risk Protection Can\u2019t Wait\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/af35a4a3b46e9c55760b9cafce573bb0\",\"name\":\"Daniel Brody\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/headshot-daniel-brody-96x96.jpeg\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/headshot-daniel-brody-96x96.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/headshot-daniel-brody-96x96.jpeg\",\"caption\":\"Daniel Brody\"},\"description\":\"Daniel Brody is a Senior Product Marketing Manager at Infoblox, where he leads messaging and go-to-market motions for Continuous Threat Exposure Management (CTEM) and external threat and digital risk protection. He focuses on translating exposure intelligence, threat research, and preemptive security controls into clear positioning that helps organizations reduce risk before impact. Daniel has over a decade of experience in cybersecurity and technology marketing, with prior roles spanning product marketing, content strategy, and communications. He has worked with security-focused startups including Cynerio (acquired by Axonius), Illusive (acquired by Proofpoint), and other high-growth technology companies, supporting solutions across threat detection, infrastructure security, and emerging risk domains.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/daniel-brody\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"550 Security Leaders on AI Threats & Digital Risk Protection AI-Driven Threats & Preemptive Security: Key Findings from 550 Leaders | Infoblox","description":"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/","og_locale":"en_US","og_type":"article","og_title":"550 Security Leaders on AI Threats & Digital Risk Protection AI-Driven Threats & Preemptive Security: Key Findings from 550 Leaders | Infoblox","og_description":"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/","og_site_name":"Infoblox Blog","article_published_time":"2026-05-19T14:55:48+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Daniel Brody","twitter_card":"summary_large_image","twitter_title":"550 Security Leaders on AI Threats & Digital Risk Protection AI-Driven Threats & Preemptive Security: Key Findings from 550 Leaders | Infoblox","twitter_description":"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg","twitter_misc":{"Written by":"Daniel Brody","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/"},"author":{"name":"Daniel Brody","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/af35a4a3b46e9c55760b9cafce573bb0"},"headline":"What 550 Security Leaders Just Told Us about the Age of AI, and Why Preemptive Digital Risk Protection Can\u2019t Wait","datePublished":"2026-05-19T14:55:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/"},"wordCount":968,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg","keywords":["AI-driven cyber attacks","preemptive security","digital risk protection","AI-generated phishing","adversarial AI attacks","deepfake cybersecurity threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/","url":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/","name":"550 Security Leaders on AI Threats & Digital Risk Protection AI-Driven Threats & Preemptive Security: Key Findings from 550 Leaders | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg","datePublished":"2026-05-19T14:55:48+00:00","description":"A new Infoblox report reveals how 550 security leaders are responding to AI-driven attacks, phishing, DNS exposure and the growing need for preemptive digital risk protection.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/drps-report-blog-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-550-security-leaders-just-told-us-about-the-age-of-ai-and-why-preemptive-digital-risk-protection-cant-wait\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What 550 Security Leaders Just Told Us about the Age of AI, and Why Preemptive Digital Risk Protection Can\u2019t Wait"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/af35a4a3b46e9c55760b9cafce573bb0","name":"Daniel Brody","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/headshot-daniel-brody-96x96.jpeg","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/headshot-daniel-brody-96x96.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/headshot-daniel-brody-96x96.jpeg","caption":"Daniel Brody"},"description":"Daniel Brody is a Senior Product Marketing Manager at Infoblox, where he leads messaging and go-to-market motions for Continuous Threat Exposure Management (CTEM) and external threat and digital risk protection. He focuses on translating exposure intelligence, threat research, and preemptive security controls into clear positioning that helps organizations reduce risk before impact. Daniel has over a decade of experience in cybersecurity and technology marketing, with prior roles spanning product marketing, content strategy, and communications. He has worked with security-focused startups including Cynerio (acquired by Axonius), Illusive (acquired by Proofpoint), and other high-growth technology companies, supporting solutions across threat detection, infrastructure security, and emerging risk domains.","url":"https:\/\/www.infoblox.com\/blog\/author\/daniel-brody\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/443"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=13660"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13660\/revisions"}],"predecessor-version":[{"id":13666,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13660\/revisions\/13666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/13661"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=13660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=13660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=13660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}