Ã… skape fremragende programvare
La oss bygge noe ekstraordinært sammen.
Stol på Lasting Dynamics for enestående programvarekvalitet.
Michele Cimmino
feb 27, 2026 • 7 min read
On February 25, 2026, IBM released its annual X-Force Threat Intelligence Index. The headline number: a 44% increase in attacks exploiting public-facing applications. But for defense organizations, the detail underneath was more alarming — AI-accelerated cyberattacks are escalating at a pace that traditional security architectures cannot match. Attacks that once took weeks to execute now take minutes. The acceleration is not linear. It is exponential.
The same week, CrowdStrike held its Fal.Con Gov conference under the theme "Cybersecurity Is National Security." The message was not subtle. Keynotes from the CrowdStrike president and senior government security leaders described an environment where adversaries leverage trusted access paths, deploy AI-enabled evasion techniques, and execute cross-domain movements that evade traditional detection.
For defense organizations, the cybersecurity landscape in 2026 is defined by three simultaneous pressures: the acceleration of AI-powered attacks, the tightening of compliance requirements, and the approaching quantum computing threat. All three demand a fundamental rethinking of how defense software is built and secured.
The numbers frame the problem. IBM's X-Force 2026 report shows a 44% increase in attacks exploiting public-facing applications. The Kiteworks 2026 report found that 73% of organizations already feel the impact of AI-powered threats. An estimated 90% of state-sponsored cyber operations are now automated (PR Newswire). Cybercriminals are exploiting security gaps at "dramatically increased" rates, according to IBM.
The ISACA's 2026 cybersecurity trends report identifies the central dynamic: AI will drive both offense and defense simultaneously. Attackers use AI to automate reconnaissance, generate sophisticated phishing at scale, identify vulnerabilities faster than human analysts, and adapt their techniques in real time. Defenders must use AI to keep pace — automated threat detection, behavioral anomaly analysis, predictive security modeling, and autonomous incident response.
CrowdStrike's 2026 Global Threat Report describes adversaries who leverage "trusted access paths" — compromising legitimate credentials, APIs, and integration points rather than breaking in through the perimeter. Identity-based, evasion-focused attacks are now the default, not the exception. For defense organizations with complex vendor ecosystems, supply chains, and partner integrations, this attack surface is enormous.
The Pentagon's response has been to dramatically increase spending: the $15.1 billion 2026 cyber budget reflects the scale of the threat. The Pentagon's AI strategy explicitly calls for "emphatically raising the bar for Military AI Dominance" — language that applies to cyber operations as much as any other domain.
The offensive posture is shifting too. The Pentagon has moved from reactive cyber defense to aggressive "Defend Forward" operations, where code is treated as a kinetic weapon. Logic bombs and zero-day exploits carry the same strategic gravity as carrier strike groups. US Cyber Command has been granted significantly expanded authorities, and classified directives are codifying the shift from defense to offense.
While the threat landscape evolves, the compliance landscape is tightening. The Cybersecurity Maturity Model Certification (CMMC) 2.0 is the most significant change to defense cybersecurity requirements in years, and its timeline is not negotiable.
Phase 1 began on November 10, 2025, and runs through November 9, 2026. During this phase, defense contractors must conduct self-assessments against NIST 800-171 requirements. The bar is clear: organizations that cannot demonstrate compliance will not be eligible for contracts that involve Controlled Unclassified Information (CUI).
La oss bygge noe ekstraordinært sammen.
Stol på Lasting Dynamics for enestående programvarekvalitet.
Phase 2 begins on November 10, 2026. This is the inflection point. Level 2 certification — required for contracts involving CUI — will require third-party assessment by accredited assessors. Self-attestation is no longer sufficient. Organizations must prove their security posture to independent evaluators.
The implications for the defense supply chain are significant. Contract eligibility is directly at stake — organizations that fail to achieve CMMC Level 2 certification will lose access to a substantial portion of defense contracts. The timeline is compressed, with Phase 2 less than nine months away; organizations that haven't started preparation are at serious risk. The scope is broad, applying to the entire defense industrial base: prime contractors, subcontractors, suppliers, and technology partners. And the assessment is rigorous — third-party assessors will evaluate 110 practices across 14 domains, and partial compliance is not compliance.
For software development companies serving defense, CMMC is not just a client requirement — it shapes how software must be built. Code repositories, development environments, CI/CD pipelines, deployment infrastructure, communication tools — everything that touches CUI must meet CMMC requirements.
The third pressure on defense cybersecurity is still emerging but already urgent.
The federal government faces what analysts call a quantum cryptography gap: the period between when current encryption becomes theoretically vulnerable to quantum computing and when organizations complete migration to post-quantum cryptography. The risk is not future — it is present.
Adversaries are practicing "harvest now, decrypt later" — capturing encrypted communications and data today, storing them, and planning to decrypt them when quantum computing reaches sufficient capability. For defense organizations handling classified or sensitive information, this means data encrypted with current algorithms may already be compromised in a practical sense. Strategic communications with multi-decade relevance — nuclear deterrence, alliance commitments — are at risk. Weapons system specifications with long operational lifetimes may become decryptable. And intelligence sources and methods, once decrypted, can enable retroactive identification of human assets.
The National Institute of Standards and Technology (NIST) published initial post-quantum cryptography standards in 2024, but migration is complex and slow. A draft quantum executive order in early 2026 tasked multiple federal agencies with accelerating quantum technology development and cryptographic migration.
For defense software development, the implication is that post-quantum cryptographic readiness must be designed into systems today — not as a future upgrade, but as an architectural requirement.
The convergence of AI threats, CMMC compliance, and quantum risk demands a fundamentally different approach to security in defense software development. The traditional model — build the software, then run a security assessment, then fix the findings — is inadequate for the current threat environment.
Fra idé til lansering lager vi skalerbar programvare som er skreddersydd til dine forretningsbehov.
Samarbeid med oss for å akselerere veksten din.
Security must be embedded into every phase of the software development lifecycle:
Secure by design. Architecture decisions — data flows, authentication mechanisms, encryption schemes, API boundaries — must incorporate threat modeling from the start. Zero-trust architecture should be the default, not an add-on.
Automated security scanning. Static analysis (SAST), dynamic analysis (DAST), software composition analysis (SCA), and container scanning must run in every CI/CD pipeline stage. Security findings should block deployments, not generate reports for later review.
Continuous monitoring. Production systems must be instrumented for real-time threat detection. AI-powered behavioral analysis can identify anomalous patterns — unusual access patterns, data exfiltration attempts, lateral movement — faster than human analysts.
Supply chain security. The SBOM (Software Bill of Materials) mandate, reinforced by the Pentagon's SWFT program in 2026, requires full transparency of every software component, dependency, and library. Supply chain attacks — like SolarWinds — are now a primary vector, and the response is total visibility.
Continuous Authorization to Operate (cATO). The traditional ATO process — a point-in-time assessment that can take 12–18 months and costs millions — is being replaced by continuous authorization. Real-time compliance monitoring, automated security artifact generation, and data-driven trust models are replacing periodic audits.
Just as attackers use AI to accelerate their operations, defenders must use AI to match the pace. Automated threat detection can identify novel attack patterns without predefined signatures. Behavioral analysis establishes baselines for users, systems, and networks, flagging deviations in real time. Predictive security identifies likely attack paths before they are exploited. Automated incident response can contain breaches in seconds rather than hours. And intelligent SIEM systems correlate events across multiple data sources at machine speed.
For defense environments — where insider threats, supply chain compromises, and advanced persistent threats are constant concerns — zero-trust is not a buzzword but a requirement. The model operates on several core principles: never trust, always verify — every request is authenticated and authorized, regardless of source. Least privilege access ensures users and systems receive only the minimum permissions needed. Microsegmentation provides network and application isolation that limits lateral movement. Continuous validation means trust is not granted once but verified continuously. And the entire architecture assumes breach — assuming adversaries are already inside and limiting the blast radius.
For European defense organizations, the cybersecurity compliance landscape has its own layer of complexity.
Vi designer og bygger digitale produkter av høy kvalitet som skiller seg ut.
PÃ¥litelighet, ytelse og innovasjon i alle ledd.
Den NIS2 Directive — the EU's updated Network and Information Security framework — imposes cybersecurity requirements on essential and important entities, including defense-adjacent organizations. Organizations must implement risk management measures, report significant incidents, and face potential penalties for non-compliance.
Den EU Cyber Resilience Act establishes security requirements for digital products with network connectivity, affecting the entire supply chain for defense software.
European defense organizations operating within NATO must also comply with alliance-specific security standards while meeting national security requirements that vary by member state.
For software development companies serving European defense, this creates a dual compliance requirement: understanding both US frameworks (CMMC, NIST, FedRAMP) for NATO interoperability and European frameworks (NIS2, GDPR, national standards) for EU compliance. Companies that can navigate both landscapes offer significant value to European defense organizations.
The cybersecurity threat clock is ticking on multiple fronts simultaneously.
CMMC Phase 2 readiness is the most immediate priority. If you handle CUI and haven't started preparation, you are behind — the November 2026 deadline is non-negotiable. AI-powered security capabilities are equally urgent: traditional signature-based detection cannot keep pace with AI-accelerated attacks, and organizations should deploy AI security tools while ensuring their software development partners build with AI-driven security from the ground up.
Post-quantum planning should begin now. Organizations need to assess their cryptographic inventory, identify systems with long data lifetimes, and prioritize them for post-quantum migration. DevSecOps adoption is essential — if security is still a phase that happens after development, restructure your process. Security embedded in every sprint, every pipeline, every deployment is the only model that works at the current threat tempo. And supply chain security demands mapping your software supply chain completely, requiring SBOMs from every vendor, and implementing continuous monitoring for supply chain vulnerabilities.
Building secure defense software requires more than adding security features at the end of development. It requires a DevSecOps approach where security is embedded from the architecture level — exactly how companies like Lasting Dynamics build mission-critical applications. With expertise spanning AI, cloud-native development, and security-first architecture, and with European governance that understands both EU and NATO compliance frameworks, LD represents the kind of partner defense organizations need as the cybersecurity landscape accelerates.
The adversary is using AI. Your cybersecurity must be at least as intelligent.
Lasting Dynamics builds security-first software with DevSecOps embedded in every phase of development. To discuss how we can help build defense-grade secure applications, contact our team.
Internal Links:
- Europe's €800 Billion Defense Rearmament: Why Software Is the New Battleground
- AI Goes to War: Pentagon vs Anthropic and the Future of Military AI Software
- The Machine War: How Ukraine's Robot Army Is Rewriting Autonomous Warfare
- Software Development for the Defense Industry: The Complete Guide
Forvandle dristige ideer til kraftfulle applikasjoner.
La oss skape programvare som gjør en forskjell sammen.
Michele Cimmino
Jeg tror på hardt arbeid og daglig engasjement som den eneste måten å oppnå resultater på. Jeg føler en uforklarlig dragning mot kvalitet, og når det gjelder programvare, er det denne motivasjonen som gjør at jeg og teamet mitt har et sterkt grep om smidig praksis og kontinuerlige prosessevalueringer. Jeg har en sterk konkurranseinnstilling til alt jeg tar fatt på - på den måten at jeg ikke slutter å jobbe før jeg har nådd toppen, og når jeg først er der, begynner jeg å jobbe for å beholde posisjonen.