Technology

Google-Acquired Wiz CTO Warns: AI's Coding Speed Demands a New Era of Cybersecurity

N
Next Headline
3 min read
Aug 06, 2025
Google-Acquired Wiz CTO Warns: AI's Coding Speed Demands a New Era of Cybersecurity

Featured image for this article

Wiz CTO Ami Luttwak, after Google's $32B acquisition, says cybersecurity must evolve rapidly as AI speeds up development. Traditional security models can't keep up.

As the pace of AI-powered development skyrockets, cybersecurity must evolve—or risk becoming obsolete. Ami Luttwak, CTO and cofounder of Wiz, the Israeli-American cloud security firm recently acquired by Google for $32 billion, argues that traditional models of cybersecurity are no longer sufficient.

“We can't treat security like a bureaucratic checkpoint anymore. Developers move fast, and security needs to move faster,” Luttwak said in a recent interview.

He calls the new wave of lightning-speed coding—powered by generative AI tools—“vibe coding.” The idea: anyone can prototype and deploy functional applications in minutes. But if building an app takes an hour, securing it should take less.

Security Needs to Be Seamless, Not a Speed Bump

Historically, developers had to wait for approval from security teams before launching features. That model is collapsing. Luttwak advocates for a "self-service security" approach—where tools are intuitive, accessible, and deeply integrated into developer workflows.

“Security has to be democratized. Developers need to own it, not fear it,” he explained.

Wiz's solution? Make security boring, but beautifully simple—like using an iPhone. Developers shouldn't need deep expertise to implement strong protections.

AI Is Accelerating the Threat Landscape

As AI tools rapidly turn developers into “feature factories,” security teams are overwhelmed. Luttwak warns that for every security engineer, there are now hundreds of developers deploying code at breakneck speed.

“It's not just engineers using AI—hackers are, too,” he added.

He argues the industry must rethink its entire approach. Instead of reacting slowly to breaches, companies must build secure-by-design systems that scale with AI\'s velocity.

Share this article:

No related articles found