#1 Trusted Cybersecurity News Platform

Search
Close this search box.

Cybersecurity market trends, from AI to post-quantum crypto

For IT services companies, the 2024 cybersecurity outlook features emerging technologies that dramatically alter the task of protecting enterprises.

Generative AI (GenAI), the expansion of edge computing and the steady march of quantum computing will all complicate the security landscape this year, according to industry executives. The partner ecosystem can expect to encounter numerous customers seeking advice across those developments.

At the same time, however, service providers will ensure clients continue to plug away at the security essentials that transcend the latest innovations.

With that in mind, here are four cybersecurity market trends to consider:

1. GenAI cuts both ways

Much of the cyber discussion this year will revolve around GenAI, which paradoxically opens vulnerabilities and augments security measures. IT services executives must navigate a technology that can cut both ways.

Srinivasan CR, Tata Communications’ chief digital officer and executive vice president, cloud and cybersecurity services, said he takes a positive view of GenAI and its effects on security. He said the technology can bolster malware analysis and speed up responses to incidents and alerts through AIOps. GenAI is also incorporated in tools such as Microsoft Security Copilot, he noted.

“Every tool and every application you use to secure the enterprise is becoming a lot more intelligent,” Srinivasan said. “Generative AI puts you in a better place.”

He acknowledged, however, that GenAI will “be used for both good and bad.”

As for the latter, security concerns include prompt injection and other large language model vulnerabilities, noted Miles Ward, CTO at SADA, a technology and business consulting firm. In addition, API attacks as well as inadvertent data leaks or exfiltration are issues with AI-based chatbots.

On the other hand, GenAI can accelerate and simplify security tasks.

Every tool and every application you use to secure the enterprise is becoming a lot more intelligent.Srinivasan CRChief digital officer, Tata Communications

“Generative AI tools are super powerful for automating or augmenting what is being done in existing cyber workflows,” Ward said.

AI technology, for instance, can facilitate security log management, a typical workflow element for a security operations center (SOC). GenAI can help review logs, make sense of data and support activities such as threat hunting, Srinivasan said. But GenAI can’t offer those advantages entirely on its own. An enterprise would first need to pool its security data in a data lakehouse, he noted.

“Generative AI is going to be a useful addition to the SOC and, in some sense, reduce the complexity of daily tasks,” Srinivasan said.

2. Edge computing complicates security, governance

Enterprises are bringing more compute power, devices, applications and workloads to the edge. That means more security concerns for service providers and their customers.

Businesses are becoming more comfortable with edge networks and associated use cases, said Ally Adnan, managing director, cyber and strategic risk, at Deloitte Risk and Financial Advisory. He said edge applications have expanded across the healthcare, retail, energy and utilities industries. But wider adoption comes at a cost.

The increasing scale of edge deployment “is absolutely increasing the risk,” Adnan said. “It should make security at the edge a higher priority.”

Cybersecurity concerns could overshadow the business advantages of moving more processing to the edge, Srinivasan said. He said the edge requires robust controls and “rock solid” cybersecurity processes.

“It’s basically distributed computing,” he said. “It widens the surface area for cyber events and attacks.”

Those attacks are increasing in sophistication, according to Adnan. Threat actors execute attacks in combination — a man-in-the-middle attack and an exfiltration, for example. This approach complicates efforts to prevent and address attacks, he added.

Against that backdrop, enterprises must plan for cybersecurity from the very beginning as opposed to building an edge network and trying to secure it later, Adnan said. And planning for edge security calls for the involvement of more people than previous IT security initiatives. The scope includes users, C-level executives and vendors, he noted.

“In the past, people worked in siloes,” Adnan said. “The roles and responsibilities with an edge network have become more complex and they tend to overlap. Having the right governance model is key here.”

Adnan said he expects to see business and technology leaders spend more time developing edge network governance models that clearly delineate roles and responsibilities. The governance task will occupy organizations this year and, potentially, well beyond.

3. Post-quantum cryptography reaches a milestone

This year might also see more enterprises start planning for post-quantum cryptography.

Julian van Velzen, chief technology innovation officer and head of Capgemini’s Quantum Lab, said it’s long been known that quantum computers will eventually be able to break conventional encryption algorithms.

“But now, that moment is getting much closer,” he said. “We need to take it very seriously.”

This year will prove to be pivotal in the evolution of this security concern, van Velzen said. He cited the expected release this year of NIST’s final standards for quantum-resistant algorithms. The regulations will set the stage for a migration to post-quantum cryptography. Organizations managing critical infrastructure and companies supplying U.S. government agencies will be among the first to implement the new cryptography, van Velzen noted. Other enterprises will follow in the coming years in what he described as a complex and time-consuming process.

“This will not be easy,” he said. “We have to think about how this migration will look and then it is probably going to take us many, many years.”

Retooling training for AI-based attacks

Service providers might find opportunities this year to help clients adjust their security training programs to reflect the expected increase in AI-based attacks.

Training programs should raise awareness of how threat actors can use the emerging technology to enhance social engineering attacks such as phishing, said Clare Mohr, U.S. cyber intelligence lead at consultancy Deloitte.

“Understanding AI-powered threats is fundamental and, moving beyond that, [it’s important to recognize] AI-enhanced attacks, especially with social engineering,” she said.

The updated training should also cover a wide range of employees, she added. That is, not just employees in technology roles, but those in areas such as marketing, finance and human resources.

“The organization’s security posture is really only as strong as the weakest link,” Mohr said.

4. Basic cyber hygiene remains a must

Businesses might pay more attention to AI, edge computing and post-quantum cryptography this year. But they should also stay focused on the basics of cyber hygiene.

SOCs, 24/7 monitoring, proactive alert response and threat hunting remain among the core security essentials, Srinivasan noted.

“Those things are really fundamental,” he said. “Many enterprises still don’t have a tick against all of them.”

A report from the Capgemini Research Institute suggested that enterprises view the security stakes as higher and plan to spend accordingly. The investment priorities report found that 61% of the business leaders polled consider cybersecurity threats “a leading risk to business growth.” Only 39% of respondents rated cyber as a business growth risk in last year’s survey.

The respondents ranked cybersecurity as their third highest technology priority in 2024, following AI/GenAI and cloud. Capgemini Research Institute surveyed 2,000 executives at the director level and up.

Facebook
Twitter
LinkedIn
WhatsApp
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Breaking News

Join 120,000+ Professionals

Sign up for free and start receiving your daily dose of cybersecurity news, insights and tips.

0
Would love your thoughts, please comment.x
()
x
We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Decline
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Privacy Policy

Last updated: February 03, 2024 This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You. We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy. This Privacy Policy has been created with the help of the Privacy Policy Generator.

Interpretation and Definitions

Interpretation

The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.

Definitions

For the purposes of this Privacy Policy:
    • Account means a unique account created for You to access our Service or parts of our Service.
    • Affiliate means an entity that controls, is controlled by or is under common control with a party, where "control" means ownership of 50% or more of the shares, equity interest or other securities entitled to vote for election of directors or other managing authority.
    • Company (referred to as either "the Company", "We", "Us" or "Our" in this Agreement) refers to VirtDefender.
    • Cookies are small files that are placed on Your computer, mobile device or any other device by a website, containing the details of Your browsing history on that website among its many uses.
    • Country refers to: Pakistan
    • Device means any device that can access the Service such as a computer, a cellphone or a digital tablet.
    • Personal Data is any information that relates to an identified or identifiable individual.
    • Service refers to the Website.
    • Service Provider means any natural or legal person who processes the data on behalf of the Company. It refers to third-party companies or individuals employed by the Company to facilitate the Service, to provide the Service on behalf of the Company, to perform services related to the Service or to assist the Company in analyzing how the Service is used.
    • Usage Data refers to data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit).
    • You means the individual accessing or using the Service, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.

Collecting and Using Your Personal Data

Types of Data Collected

Personal Data

While using Our Service, We may ask You to provide Us with certain personally identifiable information that can be used to contact or identify You. Personally identifiable information may include, but is not limited to:
    • Email address
    • First name and last name
    • Phone number
    • Address, State, Province, ZIP/Postal code, City
    • Usage Data

Usage Data

Usage Data is collected automatically when using the Service. Usage Data may include information such as Your Device's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that You visit, the time and date of Your visit, the time spent on those pages, unique device identifiers and other diagnostic data. When You access the Service by or through a mobile device, We may collect certain information automatically, including, but not limited to, the type of mobile device You use, Your mobile device unique ID, the IP address of Your mobile device, Your mobile operating system, the type of mobile Internet browser You use, unique device identifiers and other diagnostic data. We may also collect information that Your browser sends whenever You visit our Service or when You access the Service by or through a mobile device.

Tracking Technologies and Cookies

We use Cookies and similar tracking technologies to track the activity on Our Service and store certain information. Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze Our Service. The technologies We use may include:
    • Cookies or Browser Cookies. A cookie is a small file placed on Your Device. You can instruct Your browser to refuse all Cookies or to indicate when a Cookie is being sent. However, if You do not accept Cookies, You may not be able to use some parts of our Service. Unless you have adjusted Your browser setting so that it will refuse Cookies, our Service may use Cookies.
    • Web Beacons. Certain sections of our Service and our emails may contain small electronic files known as web beacons (also referred to as clear gifs, pixel tags, and single-pixel gifs) that permit the Company, for example, to count users who have visited those pages or opened an email and for other related website statistics (for example, recording the popularity of a certain section and verifying system and server integrity).
Cookies can be "Persistent" or "Session" Cookies. Persistent Cookies remain on Your personal computer or mobile device when You go offline, while Session Cookies are deleted as soon as You close Your web browser. You can learn more about cookies on TermsFeed website article. We use both Session and Persistent Cookies for the purposes set out below:
    • Necessary / Essential Cookies Type: Session Cookies Administered by: Us Purpose: These Cookies are essential to provide You with services available through the Website and to enable You to use some of its features. They help to authenticate users and prevent fraudulent use of user accounts. Without these Cookies, the services that You have asked for cannot be provided, and We only use these Cookies to provide You with those services.
    • Cookies Policy / Notice Acceptance Cookies Type: Persistent Cookies Administered by: Us Purpose: These Cookies identify if users have accepted the use of cookies on the Website.
    • Functionality Cookies Type: Persistent Cookies Administered by: Us Purpose: These Cookies allow us to remember choices You make when You use the Website, such as remembering your login details or language preference. The purpose of these Cookies is to provide You with a more personal experience and to avoid You having to re-enter your preferences every time You use the Website.
For more information about the cookies we use and your choices regarding cookies, please visit our Cookies Policy or the Cookies section of our Privacy Policy.

Use of Your Personal Data

The Company may use Personal Data for the following purposes:
    • To provide and maintain our Service, including to monitor the usage of our Service.
    • To manage Your Account: to manage Your registration as a user of the Service. The Personal Data You provide can give You access to different functionalities of the Service that are available to You as a registered user.
    • For the performance of a contract: the development, compliance and undertaking of the purchase contract for the products, items or services You have purchased or of any other contract with Us through the Service.
    • To contact You: To contact You by email, telephone calls, SMS, or other equivalent forms of electronic communication, such as a mobile application's push notifications regarding updates or informative communications related to the functionalities, products or contracted services, including the security updates, when necessary or reasonable for their implementation.
    • To provide You with news, special offers and general information about other goods, services and events which we offer that are similar to those that you have already purchased or enquired about unless You have opted not to receive such information.
    • To manage Your requests: To attend and manage Your requests to Us.
    • For business transfers: We may use Your information to evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of Our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which Personal Data held by Us about our Service users is among the assets transferred.
    • For other purposes: We may use Your information for other purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns and to evaluate and improve our Service, products, services, marketing and your experience.
We may share Your personal information in the following situations:
    • With Service Providers: We may share Your personal information with Service Providers to monitor and analyze the use of our Service, to contact You.
    • For business transfers: We may share or transfer Your personal information in connection with, or during negotiations of, any merger, sale of Company assets, financing, or acquisition of all or a portion of Our business to another company.
    • With Affiliates: We may share Your information with Our affiliates, in which case we will require those affiliates to honor this Privacy Policy. Affiliates include Our parent company and any other subsidiaries, joint venture partners or other companies that We control or that are under common control with Us.
    • With business partners: We may share Your information with Our business partners to offer You certain products, services or promotions.
    • With other users: when You share personal information or otherwise interact in the public areas with other users, such information may be viewed by all users and may be publicly distributed outside.
    • With Your consent: We may disclose Your personal information for any other purpose with Your consent.

Retention of Your Personal Data

The Company will retain Your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use Your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies. The Company will also retain Usage Data for internal analysis purposes. Usage Data is generally retained for a shorter period of time, except when this data is used to strengthen the security or to improve the functionality of Our Service, or We are legally obligated to retain this data for longer time periods.

Transfer of Your Personal Data

Your information, including Personal Data, is processed at the Company's operating offices and in any other places where the parties involved in the processing are located. It means that this information may be transferred to — and maintained on — computers located outside of Your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from Your jurisdiction. Your consent to this Privacy Policy followed by Your submission of such information represents Your agreement to that transfer. The Company will take all steps reasonably necessary to ensure that Your data is treated securely and in accordance with this Privacy Policy and no transfer of Your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of Your data and other personal information.

Delete Your Personal Data

You have the right to delete or request that We assist in deleting the Personal Data that We have collected about You. Our Service may give You the ability to delete certain information about You from within the Service. You may update, amend, or delete Your information at any time by signing in to Your Account, if you have one, and visiting the account settings section that allows you to manage Your personal information. You may also contact Us to request access to, correct, or delete any personal information that You have provided to Us. Please note, however, that We may need to retain certain information when we have a legal obligation or lawful basis to do so.

Disclosure of Your Personal Data

Business Transactions

If the Company is involved in a merger, acquisition or asset sale, Your Personal Data may be transferred. We will provide notice before Your Personal Data is transferred and becomes subject to a different Privacy Policy.

Law enforcement

Under certain circumstances, the Company may be required to disclose Your Personal Data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency).

Other legal requirements

The Company may disclose Your Personal Data in the good faith belief that such action is necessary to:
    • Comply with a legal obligation
    • Protect and defend the rights or property of the Company
    • Prevent or investigate possible wrongdoing in connection with the Service
    • Protect the personal safety of Users of the Service or the public
    • Protect against legal liability

Security of Your Personal Data

The security of Your Personal Data is important to Us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While We strive to use commercially acceptable means to protect Your Personal Data, We cannot guarantee its absolute security.

Children's Privacy

Our Service does not address anyone under the age of 13. We do not knowingly collect personally identifiable information from anyone under the age of 13. If You are a parent or guardian and You are aware that Your child has provided Us with Personal Data, please contact Us. If We become aware that We have collected Personal Data from anyone under the age of 13 without verification of parental consent, We take steps to remove that information from Our servers. If We need to rely on consent as a legal basis for processing Your information and Your country requires consent from a parent, We may require Your parent's consent before We collect and use that information.

Links to Other Websites

Our Service may contain links to other websites that are not operated by Us. If You click on a third party link, You will be directed to that third party's site. We strongly advise You to review the Privacy Policy of every site You visit. We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Changes to this Privacy Policy

We may update Our Privacy Policy from time to time. We will notify You of any changes by posting the new Privacy Policy on this page. We will let You know via email and/or a prominent notice on Our Service, prior to the change becoming effective and update the "Last updated" date at the top of this Privacy Policy. You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, You can contact us:
    • By email: info@virtdefender.com
Save settings
Cookies settings

Contact / Tip Us

Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment / feedback!