- Strategy and Management
- 7 min read
Cybersecurity Predictions: What does the cyberscape look like in 2025?
As businesses prepare to gear up for emerging risks in 2025, what are some of those security trends they need to consider? Let’s take a quick look at what cyber industry experts foretell for 2025.The world is getting serious about cyber and 2025 will be no exception. Organisations are becoming more accountable, proactive, and aware when it comes to cybersecurity and data protection. 2024 saw many data breaches and with AI enabled tools gaining traction amongst bad faith actors, 2025 is going to be no exception.
As per Kaspersky’s IT Security Economics Report, companies plan to increase their IT security budgets by up to 9% over the next two years.
The same is validated by Tech Data’s Direction of Technology Report for the APJ region which revealed that cybersecurity continues to dominate as the top technology priority, with 43% of infrastructure-focused partners planning to offer security solutions in the next 24 months. The growing sophistication of threats and the dual role of AI—both as a tool for security and a target requiring protection—are driving demand for advanced solutions.
As businesses prepare to gear up for emerging risks in 2025, what are some of those security trends they need to consider? Let’s take a quick look at what cyber industry experts foretell for 2025.
Cyber infrastructure will be centred around a single unified data security platform
As quantum attacks loom and deepfakes become mainstream tools of deception, businesses will either innovate or risk being outpaced by adversaries. In 2025, the organisations will address increased complexity by reducing the number of cybersecurity tools in use, and shifting to a unified platform, offering enhanced visibility and control. The ongoing cyber skills shortage will continue to accelerate this trend. A unified platform will provide end-to-end visibility and context, spanning code repositories, cloud workloads, networks, and SOCs.
As per Simon, 2025 is the year deepfakes go mainstream in APAC. Savvy criminals will take note and use ever-improving generative AI technology to launch credible deepfake attacks. The use of audio deepfakes will also become more widespread in these attacks, as the available technology allows for highly credible voice cloning.
Further, while quantum attacks on widely used encryption methods are not yet feasible, nation-state-backed threat actors are expected to intensify their “harvest now, decrypt later” tactics, targeting highly classified data with the intent to unlock it when quantum technology advances. This poses a risk to governments and businesses, with the potential to jeopardise civilian and military communications, undermine critical infrastructure, and overcome security protocols for most internet-based financial transactions.
Lastly, Simon stressed there will be increased focus on product integrity and supply chain security in 2025. Specifically, they will conduct much more thorough risk assessments, consider accountability and legal implications of business outages and review insurance arrangements.
In cloud environments, where complexity and scale amplify risks, real-time visibility has become a necessity. Expect to see greater focus on comprehensive monitoring involving continuous tracking of both infrastructure and application performance metrics.
Building agile security systems needs to include our security fundamentals
Reuben stressed that while it is important that we focus on AI, we cannot forget our security fundamentals. Attackers will still come after our API endpoints, and they will still conduct phishing attacks. We need to ensure that patches are deployed in a timely manner, our safeguards are always on, and that people are continuously trained to identify and mitigate malicious activity. Because with or without AI, those threats are not going away.
Containment will overtake prevention as cybersecurity strategy of choice
Organisations will begin rigorously assessing minimum viable operations to maintain essential services, mapping out detailed rebuild protocols, and establishing recovery measures to minimise downtime. This will not only protect critical services but also reduce the fallout of any single attack, shifting the security dialogue towards “how fast can we recover” rather than “how do we prevent this?”
Post-breach costs will spike, forcing a focus on recovery tools
As per Liat, in 2025, businesses will pivot toward more robust post-breach playbooks, focusing on rapid incident response, data visibility, better containment protocols, and enhanced forensic capabilities to minimise fallout. This shift signals a broader evolution in cybersecurity, with organisations embracing a more balanced approach that prioritises both breach prevention and effective recovery.
Geopolitical tensions spur living off the land attacks
As these attacks grow more sophisticated, organisations will need to refine their ability to distinguish between normal operations and subtle deviations, focusing on baseline behavior and anomaly detection. Law enforcement and cybersecurity agencies, including CISA, the FBI and the NSA, will need to bolster their efforts to counter these evolving threats, ensuring they can anticipate and mitigate such stealthy incursions.
AI will democratise malware creation, opening the door for a new class of cybercriminals
As per Steve, Generative AI models trained specifically to generate malicious code will proliferate in underground markets, making it possible for anyone with access to deploy ransomware, spyware and other types of malware with little effort. These “hacker-in-a-box” tools will automate everything from writing to deploying attacks, democratising cybercrime and increasing the volume and diversity of threats.
Zero Trust exits its buzzword era to become a fundamental security necessity
“Imagine a security system that treats every digital interaction as potentially suspicious, requiring continuous verification – much like a hyper-vigilant airport security checkpoint that doesn't just check your ID at the entrance, but monitors your every move. Zero Trust operates on a simple yet powerful principle: trust nothing by default, verify everything constantly. This methodology has become even more essential as traditional network boundaries disintegrate in our cloud-native, distributed work environments.”
Broad brush cyber regulations legislated with good intent will have a reverse effect in 2025 – creating complexity and having no real impact on stopping attacks
As per Grant, this is a complete misstep, with much of today’s regulatory efforts ineffective and not focused on the most critical aspects of security controls. Regulators still fail to recognise what will make the biggest difference in moving the needle towards immutable infrastructure.
COMMENTS
All Comments
By commenting, you agree to the Prohibited Content Policy
PostBy commenting, you agree to the Prohibited Content Policy
PostFind this Comment Offensive?
Choose your reason below and click on the submit button. This will alert our moderators to take actions