Source |
ProofPoint |
Identifiant |
8617520 |
Date de publication |
2024-11-24 17:40:19 (vue: 2024-11-25 12:07:32) |
Titre |
AI, Data Security, and CISO Shifts: Top Cybersecurity Trends to Watch in 2025 |
Texte |
Looking ahead to 2025, the cybersecurity landscape continues to evolve at a breakneck pace as threat actors continue to perfect their craft. They are using artificial intelligence (AI) to create code and more convincing lures (especially in languages that have traditionally been a barrier for entry), automate attacks, and target people with greater precision. At the same time, they are increasingly turning their attention back to us, as individual consumers, using social media and messaging apps as a testing ground before moving to larger organizations.
But it\'s not just the attack vectors that are evolving. Organizations are also faced with navigating the complexities of digital identity management, multicloud environments and new data strategies. As data becomes more decentralized, and with new regulations pushing for tighter control over digital identities and sensitive information, ensuring the right tools are in place to secure data across a sprawl of applications and environments is quickly becoming a priority for security teams.
So, what might lie ahead in 2025?
Our experts peer into their crystal balls to offer their top cybersecurity predictions for the year ahead, shedding light on the trends and technologies that will define the next wave of security challenges and solutions.
Threat Actors Will Exploit AI by Manipulating Private Data
We are witnessing a fascinating convergence in the AI realm, as models become increasingly capable and semi-autonomous AI agents integrate into automated workflows. This evolution opens intriguing possibilities for threat actors to serve their own interests, specifically in terms of how they might manipulate private data used by LLMs (Large Language Models). As AI agents depend increasingly on private data in emails, SaaS document repositories, and similar sources for context, securing these threat vectors will become even more critical.
In 2025, we will start to see initial attempts by threat actors to manipulate private data sources. For example, we may see threat actors purposely trick AI by contaminating private data used by LLMs-such as deliberately manipulating emails or documents with false or misleading information-to confuse AI or make it do something harmful. This development will require heightened vigilance and advanced security measures to ensure that AI isn\'t fooled by bad information.
Daniel Rapp, Chief AI and Data Officer
2025: The Age of "Decision-Making Machines” through AI
Generative AI will move beyond content generation to become the decision-making engine behind countless business processes, from HR to marketing to DevOps. In 2025, AI will become an indispensable developers\' “apprentice”, doing everything from automating bug fixes, to testing and code optimization. The trend towards using AI-assisted development tools will accelerate in the next year, bridge skill gaps, reduce error rates, and help developers keep pace with the faster release cycles of DevOps. AI will also supercharge DevOps by predicting bottlenecks and preemptively suggesting optimizations. This will transform DevOps pipelines into “predictive production lines” and create workflows that fix issues before they impact production.
Ravi Ithal, Group General Manager, DSPM R&D and Product Management
Under Scrutiny, AI Will Become an Essential Part of How We Do Business
A few years ago, cloud computing, mobile and zero-trust were just the buzzwords of the day, but now they are very much a part of the fabric of how organizations do business. AI technologies, and especially Generative AI, are being scrutinized more from a buyer\'s perspective, with many considering them a third-party risk. CISOs are now in the hot seat and must try to get their hands around both the \'risk vs. reward\' and the materiality of risk when it comes to AI tools. CISOs are asking exactly how employees are using AI to understand where they may be putting sensitive information at risk. As a res |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2024 2025 2025 2025: abuse abused accelerate accountable accounts across actor actors add additionally advanced advantage adversaries after again against age agents ago ahead ai aligned already also alternative and/or applications apps apt architecture are arena around artificial ask asking assets assisted asymmetric attack attackers attacks attempt attempts attention audio automate automated automating autonomous awareness back bad balkanization balls barrier based battlefield: bec become becomes becoming been before beginning behind being believe best between beyond big bit blackford blends boardroom boardrooms bogus both bottlenecks breakneck breed bridge broad budget bug burgeoning business business businesses but butchering buyer buzzwords campaigns capable card cases chain chains challenges changed channels chessin chief cios ciso cisos click cloud cloudflare cloudmark code comes communication complex complexities complexity compliance compromise compromised computing conducted confidential conflicts confuse considering consisting consolidated consolidation constraints consumers containing contaminating content context continue continued continues contraction control convergence convincing convoluted corporate correctly countless coupled craft create creating creation critical crystal cyber cyberattacks cybercrime cybercriminals cybersecurity cycles daniel data data day decades decentralized decision deeply defenders defense defenses define deliberately deliver demonstrated depend designed determining developers development device devops digital director discussions divide division divulging document documents doing dollars don download dragon drive driven dspm dynamics early ecosystem email emails embed employ employees enables encrypted end engaging engine engineered engineering engineering enhance ensure ensuring enterprise entice entry environment environments error especially espionage essential even everyday everything evolution evolve evolved evolving exactly example examples executive existing expand expansion experts exploit exploitation extortion fabric faced fall false fascinating faster fewer financially first fix fixes fixture fleecing flourish focus focused follow food fooled foundation fragmentation fragmented fraud fraudulent from gain game gaps general generating generation generative geopolitical geopolitics get gift global goal goals goes governance graphics grc greater ground group grow hands hardened harder harmful has hasn have head headaches headed hearing heightened help historically hot how hunting identities identity images impact impersonate incident income increased increasingly indispensable individual individuals information ingredients initial integrate integrated intelligence interests internet intertwined intriguing involve isn issue issues ithal job jones joshua joyce just justification keep know labels landscape language languages large larger larson layered leading leaning legitimate less leverage leveraging lie light like likely limited lines” links live llms looking lures luring machines” mail make making malicious malware management management manager managing manipulate manipulating manufactured many marketing materiality mature may measures media messages messaging methods might miller millions mirroring misleading mms mobile models momentum money more morph most motivated move moving much multicloud multimedia multiple must nate national nations navigate navigating needed new next non not now number off offer officer officer often once one only opens operational operations operations operators optimization optimizations optimizing organizations other others outcomes outside over own pace packaging paramount; part party past path patrick paydays payload payloads payment peer people perfect person perspective pig pipelines place platforms point possibilities powerful powering powers powershell preceding precision predict predicting predictions preemptively priority private processes product production |
Tags |
Ransomware
Malware
Tool
Threat
Mobile
Prediction
Cloud
|
Stories |
|
Move |
|