ISSUES - Popular report 2023-2025 | Page 13

Envisioning the technological future

The participants examined future technologies and present opportunities. Passwords are challenging today; what about alternatives? What security responsibilities can I expect from developers regarding software, devices, or applications? AI, is it a friend or a foe? What could be a worst case, or a best one?
At the seminar, it was concluded that the advice for the firm could be: Cyberattacks and threats include, for example, phishing, ransomware, and denial-of-service attacks. Consequences for the targeted company include, for example, data theft, leakage of sensitive information, financial losses, and damage to its trust and reputation among clients. A well-known saying among hackers is that it is easier to hack a human than a system. Therefore, passwords are a known risk. A password manager and multi-factor authentication are a good start. Biometric solutions, such as fingerprints and face recognition, are more secure alternatives. Using a passkey, a physical device that employs cryptography instead of passwords, is another option. Blockchain technology is one solution that is not yet widely used and can aid in securing both authentication and data protection. Experts predict that such passwordless solutions will continue to replace passwords, particularly as AI challenges authentication, for example, by cracking strong passwords within seconds. Security by design is a development approach that integrates security from the beginning rather than adding it later. However, changing the development process requires a shift in mindset, which has proven difficult to implement. Business leaders often see security as a cost rather than an investment. Why allocate a budget for something that might not happen? The Cyber Resilience Act( CRA) looks promising because it shifts the main responsibility for product security from users to manufacturers. This is often called security by default and is practiced as security by design. Users will still have duties to, to the best of their abilities, keep devices secure. CRA allows users to compare products ' security, but it is mainly up to manufacturers to create secure products.
AI has proven to be both a valuable support and a cybersecurity threat. On one hand, incident detection, analysis, and resolution become faster and more accurate. For example, work at a Security Operations Center( SOC) involves distinguishing real threats( true positives) from false alarms that are mostly harmless( false positives). The team must investigate false positives, which uses resources that could be directed toward actual threats. AI greatly enhances the effectiveness of this work. On the other hand, AI also facilitates the creation of highly sophisticated attacks. For example, personalized phishing emails, voice scams that misuse someone’ s voice and tone for phone fraud, and deepfake video and voice scams. Moreover, AI can be used to automate attacks and develop adaptive malware that can learn, adapt, and hide to bypass existing defenses. It can be concluded that AI is a tool; it changes the security landscape, driving companies’ adoption of it to stay ahead of threats.
Question about technical supports: What potential vulnerabilities could the technology have? What data and information will be involved? How are our operations, processes, or staff affected? Do the technologies have impacts on other systems or entities?

Digital security for a sustainable future