AI Cuts vCISO Workload by 68% as Demand Skyrockets, New Report Finds

A striking 79% of providers now report high demand among SMBs for vCISO services, surpassing interest in other offerings like compliance readiness and cyber insurance support. Below, we highlight key findings from the report, covering what SMBs are demanding, how MSPs and MSSPs are responding, and the growing potential of AI-powered vCISO services. The report provides an in-depth look into the evolving vCISO market and the broader advanced cybersecurity services ecosystem. As adoption accelerates, its impact on the quality, speed and scalability of vCISO services is set to grow exponentially, reshaping how cybersecurity is delivered. SMBs are driving surging demand for vCISO services to address growing threats and tightening regulations. The report finds that MSPs and MSSPs who meet SMB needs and develop a vCISO offering, can see significant concrete business gains. As cyberattacks grow in frequency and sophistication and regulatory pressures intensify, SMBs are turning to vCISO services in record numbers. This surge in demand isn’t surprising: vCISO offerings provide a flexible, cost-effective way for organizations to access high-level cybersecurity expertise without the overhead of a full-time executive. If you’re an MSP or MSSP considering or already offering vCISO services, this report is a must-read. Interestingly, these benefits appear to be widely recognized, even among providers who haven’t yet launched vCISO services. This broad awareness aligns with the strong momentum expected among MSPs and MSSPs planning to introduce vCISO offerings later this year. 74% of remaining providers say they plan to launch vCISO services by year’s end. In just one year, vCISO adoption among MSPs and MSSPs has skyrocketed by 319%, jumping from 21% in 2024 to 67% in 2025. The value of vCISO services is clear, and technology is increasingly positioned to help bridge these gaps (see below). These are some of the findings of the 2025 State of the vCISO Report, commissioned by Cynomi, the leading AI-powered vCISO platform. Just as importantly, vCISO services deliver real security value to end customers. Today, 81% of MSPs and MSSPs already leverage AI or automation in their vCISO delivery, with another 15% planning to adopt within the next year. AI is being used to automate, enhance and provide services like reporting automation and insights, remediation planning, compliance readiness and monitoring, risk and security assessments, task prioritization, and more. We highly recommend exploring the full report for deeper, actionable insights and a clear view of what lies ahead for security service providers. Ready to explore the full report? Download the full State of the vCISO 2025 Report. These include improved upsell of additional products and services (41%), increased margins (40%), a larger customer base (39%), the ability to access new prospects, and direct boost to recurring revenue.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 30 Jul 2025 13:21:02 +0000


Cyber News related to AI Cuts vCISO Workload by 68% as Demand Skyrockets, New Report Finds

The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
1 year ago Cyberdefensemagazine.com
Free vCISO Course: Turning MSPs and MSSPs into Cybersecurity Powerhouses - The vCISO Academy is a free, professional learning platform designed to equip service providers with the knowledge and training needed to build and expand their vCISO offerings, helping them better serve their clients and bolster cybersecurity ...
8 months ago Bleepingcomputer.com
AI Cuts vCISO Workload by 68% as Demand Skyrockets, New Report Finds - A striking 79% of providers now report high demand among SMBs for vCISO services, surpassing interest in other offerings like compliance readiness and cyber insurance support. Below, we highlight key findings from the report, covering what SMBs are ...
3 months ago Bleepingcomputer.com Rocke
Is the vCISO model right for your business? - It's getting harder to justify not having a CISO, so many businesses that have never had a CISO are filling the gap with a virtual CISO. A vCISO, sometimes referred to as a fractional CISO or CISO-as-a-Service, is typically a part-time outsourced ...
1 year ago Darkreading.com
Embracing the Virtual: The Rise and Role of vCISOs in Modern Businesses - In recent years, the task of safeguarding businesses against cyber threats and ensuring compliance with security standards has become increasingly challenging. Unlike larger corporations that typically employ Chief Information Security Officers for ...
1 year ago Cysecurity.news
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
1 year ago Esecurityplanet.com
Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy - You hear a lot about zero trust microsegmentation these days and rightly so. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the ...
1 year ago Feedpress.me
Understanding Cloud Workload Protection: Technologies and Best Practices - A cloud workload refers to an application or storage element within a cloud environment, whether it's public, private or hybrid. Each cloud workload uses a cloud's resources, including computation, networking, and storage. Cloud workloads can be as ...
1 year ago Securityboulevard.com
Report Surfaces Extent of SaaS Application Insecurity - An analysis of how 493 organizations are employing software-as-a-service applications published today by Wing Security finds nearly all experienced a security incident involving at least one application. A full 81% reported security incidents ...
1 year ago Securityboulevard.com
CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts | The Record from Recorded Future News - A CISA spokesperson said the agency planned to cut annual funding of $10 million that was given to the Center for Internet Security (CIS) for managing the Multi-State Information Sharing and Analysis Center (MS-ISAC) and the Election Infrastructure ...
8 months ago Therecord.media
JumpCloud's Q1 2024 SME IT Trends Report Reveals AI Optimism Tempered by Security Concerns - The report provides updated survey results and new findings to the company's biannual SME IT Trends Report, which was first released in June 2021. The latest edition of the report delves into the impact of artificial intelligence on identity ...
1 year ago Darkreading.com
What's new in the MSRC Report Abuse Portal and API - The Microsoft Security Response Center has always been at the forefront of addressing cyber threats, privacy issues, and abuse arising from Microsoft Online Services. Building on our commitment, we have introduced several key updates to the Report ...
1 year ago Msrc.microsoft.com
Trump Revenge Tour Targets Cyber Leaders, Elections – Krebs on Security - Incredibly, the president’s memo seeking to ostracize Krebs stands reality on its head, accusing Krebs of promoting the censorship of election information, “including known risks associated with certain voting practices.” Trump also ...
6 months ago Krebsonsecurity.com Hunters
Trump administration planning major workforce cuts at CISA | The Record from Recorded Future News - The Department of Homeland Security, where CISA is housed, recently expanded its voluntary departure program to include early retirement and, in some cases, a buyout, dangling a lump sum payment of up to $25,000 to employees in roles slated for ...
7 months ago Therecord.media
Google Cloud Report Spotlights 2024 Cybersecurity Challenges - As the New Year dawns, a cybersecurity report from Google Cloud suggests that while there are many challenges ahead, it will also become simpler for cybersecurity teams to leverage artificial intelligence to better defend IT environments. John ...
1 year ago Securityboulevard.com
Report: Developers are most in demand on dark web - Hacker gangs often operate like businesses - they have salaries, working hours, clients and employees. To compete in a growing market, they are constantly looking for new talent with better skill sets, and they often use the same methods as ...
2 years ago Therecord.media
Network Security Priorities For Containers, According To Today's IT Pros - As enterprises and small businesses increasingly use containers and distributed applications, threat actors are becoming increasingly sophisticated. Recently disclosed security flaws discovered in Kubernetes could have been exploited to achieve ...
1 year ago Cybersecurity-insiders.com
Survey Surfaces Raft of Cloud Security Challenges - A global survey of 414 IT practitioners published this week found 40% of respondents are relying on legacy platforms and practices originally designed for on-premises IT environments to secure cloud computing environments. Conducted by Aviatrix, a ...
1 year ago Securityboulevard.com
Get Ahead of the Game: Protecting Your Cloud Native Applications with CloudGuard CNAPP - With the increased reliance on these applications comes the need for robust security measures to protect them from potential threats. Your CNAPP platform should provide all stakeholders with a centralized view of application security health that is ...
1 year ago Blog.checkpoint.com
Third Of European Businesses Have Adopted AI, AWS - AWS finds AI already adopted at sizeable number of European businesses, resulting in increased revenues, productivity. An insight into the adoption rate of artificial intelligence within the business community has been offered in a new report from ...
1 year ago Silicon.co.uk
Telcos Forced To Pause Switch To Digital Landlines For Vulnerable - Telcos including BT, Virgin Media forced to pause switching vulnerable people to digital landlines after emergency call failures. Telecoms companies have been forced to pause the switch from analogue to digital landlines for vulnerable customers ...
1 year ago Silicon.co.uk
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
1 year ago Darkreading.com Equation
CVE-2025-38557 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
Microsoft SFI progress report elicits cautious optimism | TechTarget - "After a year, it looks like Microsoft has made some smart and substantive initial progress in elevating security across the whole organization: investment in security-focused head count, inclusion of security into performance reports across the ...
1 year ago Techtarget.com
Protecting branch office environments from ransomware The Register - Sponsored Feature Ransomware gangs that steal and encrypt vital business data before extorting payment for its decryption and restoration are ramping up global attacks at an ever-increasing rate. Cyber security experts agree that ransomware now ...
1 year ago Go.theregister.com

Cyber Trends (last 7 days)