menu
techminis

A naukri.com initiative

google-web-stories
source image

Securityintelligence

2w

read

227

img
dot

Image Credit: Securityintelligence

Cybersecurity trends: IBM’s predictions for 2025

  • AI will continue to dominate cybersecurity concerns in 2025. While it provides great benefits to data protection, threat actors can use it to accelerate social engineering attacks and sabotage AI models with malware.
  • Credential theft remains a problem, with a 71% YoY increase in attacks using compromised credentials. Costs related to the cybersecurity skills shortage remain high, with companies losing an extra $1.76 million in a data breach aftermath.
  • Positive steps saw CISA signed up over 250 software manufacturers for its Secure by Design programme, while also launching its Cyber Incident Reporting Portal to improve the way companies share cyber information.
  • In 2025, organizations will confront the risks of unsanctioned 'shadow AI' models with well-fitted governance policies, comprehensive workforce training, and diligent detection & response.
  • With the rise of multi-cloud environments and scattered identity solutions, enterprises will continue to transform their approach to identity management with an Identity-First strategy featuring an effective 'identity fabric' comprised of identity tools and services.
  • In the face of rapidly evolving hybrid cloud threats and quantum computing risks to public-key encryption standards, organizations will need to develop cybersecurity strategies that embed security into their organizational culture.
  • As organizations begin transitioning to post-quantum cryptography over the next year, crypto agility will be just as crucial to ensure systems respond quickly to new cryptographic mechanisms, algorithms and vulnerabilities.
  • With AI becoming more common, data and AI security will form an essential element of trustworthy AI in 2025, and be viewed as part of the trustworthy AI recipe.
  • Businesses need to be prepared for AI being used as a new tool for threat actors to bypass security processes and protocols. They must adopt security frameworks and best practices that address threats that advance with AI.
  • Organizations should prioritize end-to-end security for their own AI solutions, such as user interfaces, APIs, language models and machine learning operations while focusing on strategies for both AI-powered & assisted threats.

Read Full Article

like

13 Likes

For uninterrupted reading, download the app