Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreUnlock exclusive on-demand content from our latest world tour
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
October 31, 2023
Atlanta, GA – October 31, 2023 – BeyondTrust, the worldwide leader in intelligent identity and access security, today released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections, authored by BeyondTrust experts Morey J. Haber, Chief Security Officer; Christopher Hills, Chief Security Strategist; and James Maude, Director of Research, are based on shifts in technology, threat actor habits, culture, and decades of combined experience.
Prediction #1: The Evolution of the AI Threat in three stages:
Prediction #2: Dedicated Applications Start the Course Toward Extinction - Generative AI is set to make dedicated applications obsolete. The flexibility and power of AI could replace them with voice commands, facilitating the building of trust in a common interface. Complex user interfaces may become obsolete as the focus shifts to results-driven and function-specific applications.
Prediction #3: Down with VOIP and POTS, UCS is the Future - Unified Communication Services (UCS) will phase out POTS and dedicated VOIP. Vulnerabilities and hacks may compromise this once-secure communication medium.
Prediction #4: Subscription Overload, There’s a Subscription for That - Expect everyday items to transition to subscription-based models. While electronic payments replace cash, the trend of licensing products and services via subscriptions will grow. However, subscription gaps may pose data security risks.
Prediction #5: Juice Jackers Exploit the Standardization of USB-C - The proliferation of USB-C connectors brings convenience but also poses security challenges. A single standard connection type simplifies the job for threat actors, increasing the risks of attacks.
Prediction #6: Exploit Mapping for Ransomware - Ransomware attacks will shift from data extortion to selling exploitable data about organizations. Threat actors will sell information related to vulnerabilities, exploits, identities, privileges, and hygiene, focusing on potential threats and attack vectors.
Prediction #7: The Standardization of Cyber Insurance - Cyber insurance is expected to become more standardized across providers, enhancing risk reduction and liability management for businesses. A framework-based approach will standardize cyber policies.
BeyondTrust also envisions longer-term cybersecurity trends over the next five years:
Prediction #8: The Age of Malware Comes to an End - Malware is on the decline, as identity compromise and native tools replace software exploits. The focus will shift to identifying compromised identities and detecting unusual behaviors.
Prediction #9: AI Supply Chains in the Crosshairs - Nation-states will exploit AI supply chains to introduce vulnerabilities. AI code assistants and their training data become targets, potentially compromising AI infrastructure and creating new attack vectors.
Prediction #10: The Comeback Special - Vintage Tech Returns - Vintage electronics will make a modern comeback, combining nostalgia with modern connectivity. These devices may open new vulnerabilities and attack vectors.
Prediction #11: Identity Trust Chains Evolve to Take on Modern Threats - Identity verification services will emerge as a response to identity-based threats, with third-party solutions providing high-confidence identity verification in the electronic world.
Prediction #12: Evolving AI Sets Moving Target for AI Governance - AI governance and compliance fields will evolve, focusing on responsible AI regulation, ethical standards, and privacy. Regulations will vary by region, creating a moving target for AI usage.
Prediction #13: The Remote Control Gets Lost…And No One Cares - Physical remote controls are being phased out as dedicated phone applications and voice commands become prevalent. While reducing e-waste, this transition may introduce new network security challenges.
“Looking ahead helps us anticipate where cyber threat actors will undoubtedly head, and preparing for what’s ahead makes all the difference in risk management effectiveness,” said Morey Haber, Chief Security Officer at BeyondTrust. “At BeyondTrust, we plan to provide the best security solutions to address current and future attack vectors, which our customers and partners expect.”
More detail and color on each prediction can be found at the following BeyondTrust blog post.
BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners.
Learn more at www.beyondtrust.com.