Fibratel’s cybersecurity unit, known as /fsafe, has carried out an analysis of the main trends that organizations will need to take into account throughout 2026 to be able to face an overwhelming threat landscape, in which emerging technologies amplify and accelerate both the capabilities of attackers and defense opportunities through new specialized strategies.
As Juan Francisco Moreda, director of /fsafe, explains, “the global economic impact of cybercrime, at the end of 2025, will exceed 10 trillion dollars, according to experts’ estimates. If it were the economy of a country, it would be one of the three world powers, only behind the United States and China.” This scenario forces companies to review their digital risk protection, investment and management strategies.
Risk management
The combination of technologies such as cloud, IoT or artificial intelligence drives the digital economy, new ways of working and operating at an unprecedented speed of transformation. However, it also increases pressure on risk management and exposure to threats, defining a context of technological change, sophistication of attacks and the need for a response based on more coordinated and effective strategies.
For Moreda, security is no longer just about reacting, but about anticipating. “In 2026 we will see more strategic cybersecurity, integrated into the global management of organizations and with a focus on prevention and resilience by design. Our role as technological partners is to accompany companies on that path, helping them build safe, sustainable digital environments prepared for the unexpected. Because in a world where risk evolves every day, true strength lies in the ability to adapt before the attack occurs,” he concludes. This vision underlines the importance of developing continuous and flexible strategies capable of responding to an uncertain environment.
These are the six keys that will guide IT security investment decisions during 2026, according to the /fsafe team:
• Adopt a preventative cybersecurity approach: This trend is accentuated as companies in all sectors face an exponential increase in threats aimed at networks, data and connected systems, both IT and OT. To do this, they must strengthen their defense strategies and move from reactive to proactive protection.
• Implement a Zero Trust architecture without delay: As the classic perimeter disappears with the expansion of hybrid, cloud and edge environments, every access and every identity must be verified. Therefore, the Zero Trust model is no longer an option, but rather a central axis of security strategies, accompanied by SASE services that allow secure access by remote users and hybrid employees to corporate applications and data.
• Integrate AI into defense strategies and ensure its safe use throughout the enterprise: Although this technology is used to carry out more sophisticated attacks, it also offers proven capabilities that improve detection, alert prioritization, and defense automation. EDR/XDR systems to monitor, detect and respond to threats, along with SIEM platforms to collect, analyze and manage security data in real time, will be essential. A SOC – on its own or as a managed service – will reinforce these strategies, improving detection, response and prevention. Likewise, security will be a priority in the protection of artificial intelligence, which will require adequate data governance and ethical governance frameworks to generate value, efficiency and return on investment.
• Adapt to new safety regulations: The NIS2 directive expands the obligation of essential companies and critical sectors to implement resilience measures. This means having solutions that allow you to identify and evaluate risks, ensure an agile response to incidents, protect the supply chain, enable vulnerability disclosure and incident notification mechanisms, as well as apply multi-factor authentication and encryption of data in transit. All of this will need to be integrated into more robust and up-to-date compliance strategies.
Companies across all sectors face an exponential increase in threats targeting networks, data and connected systems, both IT and OT.
• Provide protection resources to the weakest link: 2026 should be a decisive year to invest in employee training, teaching them to recognize different forms of attacks and implementing a culture of cybersecurity awareness. At the same time, both the sector and internal teams will have to address the skills shortage, adopting talent attraction and retention strategies, collaborating with educational institutions and promoting professional retraining.
• Ensure recovery capacity: A business continuity plan is essential that includes automated, encrypted and immutable backup, along with well-documented action protocols and recovery simulations in isolated environments. These actions must be part of resilience strategies that allow organizations to minimize the impact and accelerate the return to normality after an incident.
