A good future for tech in 2021 and beyond

Issue 9 2020 Information Security

It’s been a tough year. But there’s good news on the tech horizon. As we all learned in the tumultuous, often tragic months of 2020, technology is essential to nearly every aspect of our lives – from health and learning to work and entertainment.

But while technology has been a lifeline for millions, it needs to get better. Way better.

That’s why I’m excited about what is to come. The pandemic drove technology adoption in amazing ways – indeed, the future arrived seemingly overnight. Networking, cloud, security, collaboration, and other digital technologies all played a huge role in keeping the world running.

Despite our current struggles, I see a time when we move past the pandemic and into that better world. Here are some of the top technology trends that I believe will lead the way towards a better future in 2021.

A bridge over the digital divide

The COVID-19 pandemic put a glaring spotlight on the biggest inequities in our society and around the world. Today, a lack of connectivity separates half the global population from opportunities in learning, business, and healthcare. In nearly every country, the digital divide affects rural communities and the poor disproportionately.

The next generation of wireless technologies – including 5G and Wi-Fi 6 – can go a long way towards closing the divide.

These technologies will raise the bar on bandwidth, speed, and latency, and reach areas where fibre is prohibitively expensive – including rural communities, from African villages to Native American reservations.

Frontline mobile workers, telehealth, manufacturing, and education will all benefit from next-gen wireless as well. We see pervasive wireless connectivity as the ultimate flattener of the digital divide as these new technologies spur growth, innovation, and opportunity for millions of people who are currently on the wrong side of the divide.

The rise of the sensors

We’ve been hearing about the promise of the Internet of Things (IoT) for years. But lately, a confluence of innovations, including advanced network technologies, next-gen wireless and AI, to name a few, are making it a reality. Add to that cheap, smart, and soon-to-be pervasive sensors and we will be interacting with our world, our machines and one another in exciting new ways.

The workplace is a great example. Data based insights delivered by sensors will help provide a healthier and more productive environment. Combined with Wi-Fi, location technologies, and infused into collaboration platforms like Webex, they will identify underutilised or overcrowded spaces, while monitoring conditions like room temperature, humidity, air quality and light.

But the potential for sensors is even greater. For example, sports sensors will be alert for signs of concussion. And fatigue sensors will monitor alertness in potentially dangerous environments.

All of this data will be collected and turned into actionable, real-time insights, with AI playing an increasing role in keeping us informed for better decisions.

Security that’s simple, solid and password free

Cloud and mobility were critical to the agility that kept the world going in 2020. But with so many far-flung workers and devices spread across multiple clouds, the very concept of a security perimeter has blurred – all in an environment where fast responses to security threats are crucial. This demands security that’s integrated, automated, and simple to use and monitor.

In Cisco’s global 2021 Security Outcomes Study, a well-integrated technology stack was a top driver of success. One of the biggest challenges in security is knowing what’s real and what’s a threat in complex environments.

‘Zero trust’ was developed to ensure that nothing – and no one – gets by without verification. It reacts to a constantly changing environment, ensuring that only the right users or devices get access to your network. In the 2021 Security Outcomes Study, 39 percent of respondents said they were “all in” on zero trust, while another 38 percent were 'moving in that direction'.

At the same time, a password-free future is on the near horizon, as enabling technologies such as biometrics become popular with both consumers and enterprises.

Paying for the tech you actually need

Organisations have long invested in one-size-fits-all tech solutions. That meant paying for features that users might never actually need. Today, software-as-a-service enables organisations to pay for the features and capabilities they currently need, with the option to scale other services with great speed and agility when needed.

Consumption models will continue to shift, especially as more and more features and capabilities are available via software, whether on site or in the cloud. The flexibility and cost savings that pay-as-you-consume models provide are simply too good to resist.

This shift to pay-as-you-consume spending gives organisations more flexibility and cost predictability to manage their IT spend – something that 85 percent of CIOs and IT decision makers in Cisco’s 2021 CIO and ITDM Trends Pulse report agreed is important to their business (43 percent called it very important).

Keys to the future: app-enabled agility and resilience

In the early months of the pandemic, organisations had to adapt quickly to meet highly unpredictable changes. Cloud was the critical enabler of this new agility. For many organisations, it was the only way to meet the rapidly shifting demands of their customers and employees, regardless of costs.

Ten months later, the applications at the heart of our businesses are highly distributed. Our workforces are more mobile than ever before. And the demands on our systems are unprecedented.

Looking ahead, IT teams will need even greater agility. With enhanced observability solutions, teams can shift from monitoring everything to monitoring just the data and insights that matter. Both insights and automation will be essential to future growth, competitiveness, and resilience.


HSS.21.24 Gordon Thomson, global vice president for EMEAR specialist sales, Cisco.

From serving customers to delighting them

Today, mobile apps enable everything from shopping and banking to learning and wellbeing – and they’ve even helped track COVID cases. Mobile apps also enable both public and private sector organisations to connect with and understand users in ways that were unimaginable just a few years ago. Of course, most business processes also run on applications.

The most advanced of these promise more personalised relationships, along with instantaneous responses. That demands the ability to turn masses of real-time information from the network into actionable insights. And to do it fast.

Armed with such capabilities, companies can respond to a customer even before they report an issue or a need. It’s this combination of immersive, intelligence-based personalisation and experience that will transform baseline customer satisfaction into deep customer engagement, excitement and loyalty.

With innovation accelerating at a fast pace, there’s a tremendous opportunity to use new technologies to create organisations that are more flexible, responsive, and resilient. At the same time, I believe our higher mission is to use technology to improve lives across the planet.

Which technology trends do you have on your radar?




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.