{"id":361767,"date":"2026-02-25T08:45:00","date_gmt":"2026-02-25T16:45:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=411534"},"modified":"2026-02-25T08:45:21","modified_gmt":"2026-02-25T16:45:21","slug":"only-39-of-security-managers-using-ai-have-seen-how-it-improves-their-reporting-speed","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/only-39-of-security-managers-using-ai-have-seen-how-it-improves-their-reporting-speed\/","title":{"rendered":"Only 39% of security managers using AI have seen how it improves their reporting speed"},"content":{"rendered":"\n<p>A recent report from Splunk indicates that more than two-thirds of Chief Information Security Officers (CISOs) believe that investing in AI-driven cybersecurity capabilities is a crucial priority. However, despite this consensus, <strong>only 39% of CISOs who have implemented AI partially<\/strong> <strong>or fully report that they have noticed a significant increase<\/strong> in their teams&#8217; reporting speed.<\/p>\n\n\n<h2 class=\"wp-block-heading\">AI, what is it for?<\/h2>\n\n\n<p>The adoption of AI in cybersecurity brings significant concerns. An 83% of CISOs are worried about the &#8220;hallucinations&#8221; of AI models and the lack of human oversight, as well as the legal liability that may arise from the actions of these agents. Additionally, <strong>data breaches are seen as the main concern by more than 75% of respondents<\/strong>, and 90% of those using generative AI view shadow AI as a primary challenge.<\/p>\n\n\n<p><strong>CISOs face multiple challenges in their work<\/strong>, with the increasing sophistication of threat actors (95%) and rapid technological evolution (89%) being the most concerning. Changes in the regulatory environment (76%) and labor shortages (47%) add another layer of complexity, while only 1% believe that new technologies are the best solution to the skills gap in their team.<\/p>\n\n\n<p>Despite these challenges, <strong>82% of CISOs believe that AI can accelerate data analysis, and 63% are confident that it can mitigate personnel gaps<\/strong>. With the growing use of AI, Splunk recommends that CISOs prioritize communicating their work in a way that is understandable to the rest of the company, and emphasize clear governance of AI to protect security operations in an increasingly complex environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent report from Splunk indicates that more than two-thirds of Chief Information Security Officers (CISOs) consider investing in AI-driven cybersecurity capabilities a crucial priority. However, despite this consensus, only 39% of CISOs who have implemented AI partially or fully claim to have noticed a significant increase in their teams&#8217; reporting speed. AI, what is it for? The adoption of AI in cybersecurity brings important concerns. 83% of CISOs are worried about the &#8220;hallucinations&#8221; of the [&#8230;]<\/p>\n","protected":false},"author":9317,"featured_media":361768,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[15053,3854],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-361767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cisa","tag-ia"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/361767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9317"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=361767"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/361767\/revisions"}],"predecessor-version":[{"id":361776,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/361767\/revisions\/361776"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/361768"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=361767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=361767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=361767"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=361767"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=361767"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=361767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}