Emerging Trends in Cybersecurity
Cybersecurity in 2023 is one of those fields where the pace of change has finally exceeded the pace of the conference circuit. By the time a trend gets a keynote, it is usually old. Here are the five trends actually worth tracking — and the noise to safely ignore.
1. AI on both sides
The defence side gets the breathless press releases, but the attacker side is moving just as fast. The realistic picture:
- Defenders get faster triage, better anomaly detection, and the ability to summarise alerts in plain English.
- Attackers get scaled spear-phishing, deepfake voice for vishing, and faster vulnerability research.
Net effect: the floor of attacker capability is rising. Unsophisticated attackers can now pull off mid-tier campaigns. Plan for that.
2. Post-quantum cryptography is no longer theoretical
NIST finalised the first batch of post-quantum standards (Kyber, Dilithium, Falcon, SPHINCS+) in 2022. The cryptographic libraries are already shipping. If you have not started planning your crypto-agility migration, 2024 is the year. Particularly for any data that needs to remain confidential past 2030 — that data is being recorded today for future decryption.
3. Identity is the new perimeter
"Zero trust" was a slogan five years ago. It is finally an architecture today. The practical implications:
- Phishing-resistant MFA (passkeys, FIDO2) becomes the default.
- Service-to-service auth moves from network ACLs to workload identity (SPIFFE, OIDC).
- The CISO conversation shifts from "firewalls" to "identity hygiene".
4. The software supply chain
SolarWinds, Log4Shell, MOVEit. Each of these was a supply-chain incident, not a perimeter incident. SBOMs, signed builds, dependency pinning and reproducible builds have moved from "nice to have" to "audit requirement". Particularly for any organisation supplying federal or critical-infrastructure customers.
5. The privacy regulator finally has teeth
GDPR, CCPA, India's DPDP Act, Pakistan's draft PDP bill — the pattern is the same. Regulators have moved from "issuing guidance" to "imposing nine-figure fines". Privacy engineering is now a board-level concern. The teams that built data lineage and consent infrastructure in 2022 are reaping the benefits today.
What to ignore
- Anything described as a "single pane of glass". The pane of glass is in your head.
- Anything where the demo runs faster than your actual data ingestion pipeline.
- Conference vendors selling "ChatGPT for security" without a clear data-handling policy.
What to do this quarter
- Inventory your cryptographic dependencies.
- Enrol every employee in phishing-resistant MFA.
- Generate an SBOM for at least one production service.
- Read the privacy law that applies to your jurisdiction. Yes, all of it.
None of those four items is a procurement decision. All of them will pay for themselves the first time something goes wrong.