Industry executives and experts share their predictions for 2025. Read them in this 17th annual VMblog.com series exclusive. By Bri Frost,
Director of Security Curriculum and Research at Pluralsight
There has been considerable news coverage in recent
months playing up the term "AI-powered attacks." While this
terminology amounts to little more than a buzzword, it has proven to be
dangerous. The angle of many of these stories is that organizations need to
shift their security focus - including budget and assets - to thwart AI threats
and attacks.
However, the fact remains that AI is not creating
cyberattacks as it lacks the inherent intent, decision-making capabilities, and
context that human operators bring to the table. At its core, AI is designed to
process and analyze large data sets, identify patterns, and optimize processes.
There is no doubt that AI is a powerful tool with vast applications, but
launching a cyberattack requires human
direction and oversight.
Successful cyberattacks are conducted using the same
methods and tactics, and, in some cases, AI is leveraged to increase the scale
and efficiency of attackers and threat groups. In 2025 and beyond, it will
become increasingly important that organizations and the general public become
more aware of how to recognize security threats and the best practices they can
employ to protect themselves. This includes participating in cybersecurity and AI training to learn the
skills they need to stay safe in an AI-driven world.
A cyberattack requires a purposeful strategy, an
understanding of vulnerabilities, and often an element of social engineering,
all driven by human expertise. While AI can assist in various stages of a
cyberattack-such as automating specific tasks or enhancing the effectiveness of
malicious software-it still relies on human actors to deploy, control, and
adjust these tools for malicious purposes.
Moreover, the use of AI in cybersecurity will be
increasingly leveraged in the future as a force for good. AI can detect
threats, analyze security patterns, and improve defenses by identifying
potential weaknesses before they are exploited. While AI requires human
direction and cannot autonomously launch cyberattacks, its role in
cybersecurity remains instrumental in both defense and attack.
Workforces that are trained in areas such as cyber threat intelligence, emulation of emerging cyber
risks, and incident response, will future-proof their organization's
ability to mitigate security breaches and safeguard digital assets. Armed with
the proper knowledge and upskilling, IT professionals will utilize AI
responsibly, enabling them to strengthen cybersecurity efforts, prevent
malicious attacks and protect organizations from harm.
Defending an
Expanding Number of Attack Entry Points
Organizations that use AI to strengthen cybersecurity
must also develop more innovative security solutions to protect the increasing
number of entry points for threats. As the technical landscape continues to
evolve, remote work and the proliferation of tools that include IoT devices,
wearables, and surveillance systems will continue to expand the potential entry
points for cyberattacks.
Managing cybersecurity in an AI-dominated environment
is an enormous undertaking, as vulnerable targets give threat actors more
opportunities to do harm. In the years ahead, more focus will be placed on
implementing firewalls, intrusion detection systems, and extended detection and
response tools to thwart attacks on a network's edge.
It is critical for organizations to have a strong
understanding of risk management frameworks and the ability to
analyze emerging threats. Cybersecurity professionals need to be able to
identify potential vulnerabilities across networks, cloud environments, and
applications. This includes utilizing threat intelligence tools to predict and
counter new attack vectors before they're exploited.
With the prevalence of flexible work options and cloud
computing, securing network infrastructure will continue to present challenges.
Cybersecurity professionals must be proficient in protecting networks and
secure network design principles to prevent unauthorized access. As the number
of devices and users increases, robust identity and access management practices
are essential. To safeguard sensitive data in the years ahead, organizations
will increase their reliance on strong authentication protocols, multi-factor
authentication, and least-privilege access controls.
Cybersecurity experts must also understand how to
secure an array of endpoints, such as laptops, mobile devices, and IoT devices,
which are becoming increasingly targeted by cybercriminals. To monitor for and
protect against threats, a multi-layered approach that includes deploying
endpoint protection platforms and endpoint detection and response is critical.
Segmentation and secure configurations reduce risk for IoT devices, and
workforces should be trained on best practices to minimize vulnerabilities. This
combination of strategies will enable cybersecurity experts to protect a range
of endpoints from potential attacks.
Securing cloud environments is a top priority
as organizations migrate to the cloud. Knowledge of cloud security principles,
shared responsibility models, and encryption techniques are vital to protecting
data stored and processed in cloud platforms. When future cyberattacks occur,
organizations will need professionals who can quickly detect, respond to, and
recover from the incident. In the coming years, forensics, incident management,
and disaster recovery planning skills will be critical for minimizing damage
and ensuring business continuity.
With the increasing sophistication of cyber threats,
automation, and AI-driven tools will be essential for quickly detecting and
responding to attacks. Cybersecurity professionals must be skilled in
integrating and utilizing these tools to reduce response times and enhance
security posture.
In 2025 and beyond, individuals and organizations must
be empowered through training to build these essential cybersecurity skills.
This includes courses and hands-on labs that address the full spectrum of
cybersecurity challenges to enable workforces to stay ahead of evolving threats
and better protect the growing number of entry points to their systems. Through
continuous learning and skill development, organizations will create a
resilient workforce capable of defending against both present and future complex cyber threats.
##