If you need a sign that the cybersecurity landscape has undergone a permanent phase shift, the last few weeks provided it in spades.
Between the strategic outlook from the numerous “cyber industry days” I attended while at RSAC2026 and other intense sessions, plus Anthropic’s startling decision to gate Claude Mythos behind a restricted “Project Glasswing” initiative, the message to cybersecurity professionals is clear: The traditional playbook isn’t just aging; it’s obsolete.
1. The Mythos Moment: When AI Goes “Rogue”
We often talk about AI in its infancy, but Claude Mythos just hit a terrifying “puberty.” Anthropic withheld the model because it demonstrated a “step-change” in autonomous offensive capabilities, finding and weaponizing zero-day vulnerabilities in every major operating system and browser. In one case, it discovered a 27-year-old vulnerability in OpenBSD that millions of man-hours and automated tests had missed.
Thousands of high-severity findings in just weeks of testing (via an agentic scaffold with minimal human steering). Human experts reviewed 198 reports and agreed with Mythos’s severity assessment in ~89–90% of cases; the “thousands” figure extrapolates from that. Because Mythos Preview autonomously discovered thousands of high-severity zero-days, they created Glasswing. The project gives vetted defenders early, controlled access to hunt and fix vulnerabilities in foundational systems before similar AI capabilities spread more widely.
The real “darkside” isn’t just the model itself; it’s the Loss of Control (LOC). Even though Mythos wasn’t fully released, its capabilities are now the benchmark. What happens when an unmonitored, open-source model like DeepSeek or a rogue nation-state variant achieves this same “out of the box” exploitation power? The “patch window” doesn’t just shrink; it collapses to near zero. For CISOs, Continuous Threat Exposure Management (CTEM) is no longer a luxury; it is a baseline survival requirement.
2. Identity: The Only Perimeter Left
A recurring theme at RSAC this year was the final death of the network-centric perimeter. In an era of agentic, autonomous tools and hybrid infrastructure, Identity is the control plane. When I was at Microsoft, we would tell everyone that would listen, “Identity is the new perimeter” and “Turn on MFA.” It baffled me how many “C-Suites” responded with “That’s on our roadmap for next year.” In this case, next year is too late.
We have to treat every identity, human or machine, as a potential entry point for a sophisticated, AI-driven exploit. This means moving beyond simple MFA to Identity Threat Detection and Response (ITDR). If we can’t verify the intent behind an identity’s behavior in real-time, we’ve already lost the keys to the kingdom.
3. Networking and Deep Telemetry
As highlighted during on Cyber Industry Day I attended, the market is rewarding platforms that provide deep, granular visibility. Endpoint detection (EDR) is no longer enough when sophisticated actors can use AI to bypass sandboxes and target protocol-level anomalies.
We are seeing a massive reinvestment in Network Detection and Response (NDR) and full packet inspection. Why? Because while an actor might spoof an identity or hide on an endpoint, their behavior on the wire, lateral movement, C2 callbacks, and east-west traffic, is much harder for an AI to mask.
4. Architecture with Guardrails: Security by Design
For years, “security by design” was a buzzword. Now, it’s a survival mechanism. The increasing importance of architecture isn’t about drawing better diagrams; it’s about architecting with guardrails that are programmatic and immutable from the beginning. During my time working at 2 major hyperscalers, Amazon and Microsoft, I would spend a lot of time explaining to customers the importance of design and architecture. Like cloud solutions, AI is coming so quickly, users are just jumping in with both feet, not even thinking about the sharks in the water. You don’t just start nailing 2x4s together to build a house. You start with a plan and a blueprint. This is no different and even more critical because everything is interconnected. There is no “standalone” anything.
We need to design systems where:
- Data Protection – baked into the storage layer.
- Guardrails – prevent agents, both internal and external, from drifting outside of defined policy.
- Resilience – measuring by how quickly we can “re-pave” an environment after an inevitable breach.
The Bottom Line
As Paul “Bear” Bryant famously said, “Defense wins championships.” In our world, a flashy offensive response might look good on a slide deck, but one wrong move in the heat of a major incident can have catastrophic impacts on both company stability and country relationships.
The era of “set it and forget it” security is over. We are now in a race of intelligence, machine vs. machine, where the winner won’t be the one with the biggest firewall but the one with the most resilient architecture and the best visibility into their data.
Investor’s Corner: The PE and VC Outlook
The technical phase shift we are witnessing is creating a massive ripple effect in the capital markets. As was discussed during the Piper Industry Day and at the Nightdragon Cyber Day, the investment thesis for 2026 has moved past general excitement into a much more disciplined, infrastructure-heavy focus.
For private equity and venture capital, the current landscape is defined by three key drivers:
- The Rise of “Acceleration Scarcity”: Investors are no longer chasing every startup. Instead, capital is concentrating into a small group of “true winners” that have successfully integrated automated defense into their core operations. We are seeing a “K-shaped” recovery in valuations where platforms that offer deep telemetry and automated guardrails are commanding massive premiums. Gross Revenue Retention (GRR) is now key along with customer retention and how quickly you can build out/adjust your roadmap to remain relevant and continue growth.
- Identity as the New M&A Battleground: If identity is the control plane, then ITDR is the most valuable real estate in the portfolio. We are seeing a surge in strategic acquisitions as larger incumbents look to swallow up innovative identity-first startups.
- Platform Consolidation vs. Point Solutions: In an unstable market, CISOs are looking to reduce complexity. From an M&A perspective, this favors platforms that can offer a unified architectural approach. We expect to see continued consolidation in the CNAPP and NDR spaces.
The take-away for the street: 2026 is the year of operational continuity. Investors aren’t just looking for “coverage”—they are looking for companies that help an organization function normally within a climate of permanent instability.
Let’s Discuss
Is “Security by Design” still a pipe dream, or are we finally ready to architect with the assumption that the AI has already found the door?
Stay caffeinated, stay secure.
Please reach out to me or Boston Meridian Partners via our webpage and LinkedIn below.
Boston Meridian LinkedIn Page <- Follow this company!
About the Author:
I am Shawn Anderson, CTO and 2x former CISO, currently leading technical strategy at Boston Meridian. We are a boutique investment bank specializing in M&A and capital raises ($20m+) for the Cyber and Infrastructure sectors. Let’s connect on LinkedIn to discuss where the market is moving next.


