The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords

While the world will always be unpredictable, several strong trends in cybersecurity point to promising and concerning developments in the months ahead. One thing's for sure: 2024 will be a very significant and interesting year.
Artificial intelligence has advanced at an incredible pace in recent years, and its implementation in cybersecurity is only going to become more prevalent and important.
This year, the evolution of AI and quantum computing could lead them to meet head-on.
The security industry is already thinking about and planning how to manage this, how we share information safely, how we manage trust and privacy, and many other worries that could impact society and everyday life.
The evolution of generative AI and deep fakes will become a real threat to democracy.
Advancements in this technology will lead to voice and video phishing attacks becoming much more frequent and more difficult to identify.
Democracy will face its biggest challenge this year and we could see widespread manipulation of the public through misinformation, disinformation, and manipulation of communications and voting procedures.
We've already seen governments taking steps to be much more active in cybersecurity and this is sure to accelerate in 2024 as cybercrime is recognized to damage national economies.
Cybersecurity professionals will finally have the chance to harness AI for good, and certainly more efficiently and effectively than attackers can adopt it for malicious intent.
AI will certainly change things in cybersecurity, but we doubt it will relieve the demand for experienced experts.
As threats increase, companies will need more senior and experienced professionals than before to solve even more complex problems.
For years, the cybersecurity industry has been in a reactive mode, trying to solve problems and repair damage caused by cybercriminals.
The fast-growing domain of security posture management could finally come into its own.
While this has been done across different cloud platforms, the ability to measure security posture management will get more interesting as companies expand the features and toolsets of their services to include preventative controls and extensive exposure management scoring to lower everyone's security risk profile.
LLMs can provide much more machine-led feedback in cybersecurity and raise the quality of incident tickets, thereby accelerating security analysts' work and enabling better communication with people in other parts of the business.
LLMs are sure to be increasingly used for alert handling, response guidance, vulnerability assessments, designing red teams and tests, plus other areas that will become clear as the industry evolves.
Employees who are trained with and comfortable using AI tools will be more productive.
The combination of human ingenuity and AI will allow people and organizations to achieve more than ever before.
It could finally be the year when the use of passwords will slowly but surely begin to decline.
Last year, FIDO PassKeys helped to start making the passwordless approach viable for websites whilst being supported by all the major players.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 08 Feb 2024 15:43:04 +0000


Cyber News related to The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords

IBM Heron Quantum Chip, Quantum System Two - Next generation quantum processor dubbed 'Heron', and the modular IBM Quantum System Two unveiled by Big Blue. IBM has unveiled two new quantum developments, with a new series of utility-scale processors housed within a modular quantum system. At its ...
11 months ago Silicon.co.uk
Quantum computing: The data security conundrum - One of the biggest challenges of digital technology today is around security systems and data. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional ...
9 months ago Itsecurityguru.org
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
1 month ago Aws.amazon.com
Quantum computing will enable a safer, more secure world - Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded. First, it's ...
10 months ago Cybersecurity-insiders.com
The age of weaponized LLMs is here - It's exactly what one researcher, Julian Hazell, was able to simulate, adding to a collection of studies that, altogether, signify a seismic shift in cyber threats: the era of weaponized LLMs is here. The research all adds up to one thing: LLMs are ...
11 months ago Venturebeat.com
Exploring the Security Risks of LLM - According to a recent survey, 74% of IT decision-makers have expressed concerns about the cybersecurity risks associated with LLMs, such as the potential for spreading misinformation. Security Concerns of LLMs While the potential applications of ...
10 months ago Feeds.dzone.com
DORA and your quantum-safe cryptography migration - Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. New requirements for financial entities in the EU. DORA lays out a set of requirements across ICT risk management, incident ...
9 months ago Securityintelligence.com
Getting your organisation post-quantum ready - While quantum computing is still very much in its early stages, it's important that companies are already thinking about this evolving technology - and more importantly implementing and stress testing much needed solutions suitable for a post-quantum ...
11 months ago Cybersecurity-insiders.com
It's time to bolster defenses for an AI / Quantum Future - The rapid advances we are seeing in emerging technologies like AI, ML and quantum computing will have a devastating impact on organizations not prepared and who have not considered updating existing modes of asymmetric data encryption. Quantum is ...
9 months ago Cybersecurity-insiders.com
4 key devsecops skills for the generative AI era - Experts believe that generative AI capabilities, copilots, and large language models are ushering in a new era of how developers, data scientists, and engineers will work and innovate. They expect AI to improve productivity, quality, and innovation, ...
10 months ago Infoworld.com
The impact of prompt injection in LLM agents - This risk is particularly alarming when LLMs are turned into agents that interact directly with the external world, utilizing tools to fetch data or execute actions. Malicious actors can leverage prompt injection techniques to generate unintended and ...
11 months ago Helpnetsecurity.com
Safeguard Your Network in a Post-Quantum World - There is an imminent threat to existing cryptography with the advent of quantum computers. A quantum computer works with qubits, which can exist in multiple states simultaneously, based on the quantum mechanical principle of superposition. Thus, a ...
9 months ago Feedpress.me
Post-Quantum Cryptography Alliance Launches to Advance Post-Quantum Cryptography - PRESS RELEASE. SAN FRANCISCO, Feb. 6, 2024 /PRNewswire/ - The Linux Foundation is excited to announce the launch of the Post-Quantum Cryptography Alliance, an open and collaborative initiative to drive the advancement and adoption of post-quantum ...
9 months ago Darkreading.com
11 GenAI cybersecurity surveys you should read - Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. As the integration of these technologies continues, a vigilant approach to ethical considerations and ...
10 months ago Helpnetsecurity.com
The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords - While the world will always be unpredictable, several strong trends in cybersecurity point to promising and concerning developments in the months ahead. One thing's for sure: 2024 will be a very significant and interesting year. Artificial ...
9 months ago Securityboulevard.com
What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future - Cryptography has long been essential in ensuring the protection of data and communication networks. Remaining reliant on outdated cryptographic standards certainly adds to the dangers of compromise. As we usher in an era of cloud-scaling and quantum ...
8 months ago Cyberdefensemagazine.com
Tech Giants Form Post-Quantum Cryptography Alliance - The Linux Foundation today announced the launch of the Post-Quantum Cryptography Alliance, an initiative to advance and drive the adoption of post-quantum cryptography. Founded by AWS, Cisco, IBM, IntellectEU, Nvidia, QuSecure, SandboxAQ, and the ...
9 months ago Securityweek.com
Why training LLMs with endpoint data will strengthen cybersecurity - Capturing weak signals across endpoints and predicting potential intrusion attempt patterns is a perfect challenge for Large Language Models to take on. The goal is to mine attack data to find new threat patterns and correlations while fine-tuning ...
10 months ago Venturebeat.com
Simbian Unveils Generative AI Platform to Automate Cybersecurity Tasks - Simbian today launched a cybersecurity platform that leverages generative artificial intelligence to automate tasks that can increase in complexity as the tool learns more about the IT environment. Fresh off raising $10 million in seed funding, ...
7 months ago Securityboulevard.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
6 months ago Feeds.fortinet.com
Breakthrough promises secure quantum computing at home - The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough by scientists at Oxford University Physics guaranteeing security and privacy. This advance promises to ...
7 months ago Sciencedaily.com
China plans to take 'hack-proof' quantum satellite technology to new heights - China is planning new, cutting-edge quantum communications satellites. China launched the first dedicated quantum communications satellite, named Micius, in 2016, and has been quietly working on followup missions in the years since. "Low Earth orbit ...
11 months ago Space.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
How Communications Companies Can Prepare for Q-Day - After a grueling eight years of testing, the National Institute of Standards and Technology (NIST) has finalized the first three algorithms that will form the backbone of the world's strategy to counter the potential threats of quantum ...
1 month ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)