PQC, AI & sustainability: five cybersecurity trends for 2024

Issue 8 2023 Editor's Choice

The year 2023 will go down as a transitional year for cybersecurity and information technology in general. Quantum Computing is still in its infancy, and artificial intelligence is still limited to creating (mostly) authentic written and visual content rather than Artificial General Intelligence. Transformative technology is coming soon, but in the meantime, we are still struggling with rising rates of online crime and a shaky economy throughout much of the world.

This year, 2024, may be when we start to see these themes begin to change the world, with their impact felt in cybersecurity and, ultimately, our lives. In this article, we will look at some of the most important developments that our experts see coming in 2024, both in technology and the wider world it intersects with.


Nils Gerhardt.

PQC’s Y2K

For home computer users, the ‘Y2K bug’ was essentially a myth, and stories of ‘planes falling out of the sky and nuclear reactors shutting down’ were very much over-egged. Yet, the transition from the 20th to the 21st century did produce problems for several vital legacy systems that needed to be addressed.

We see similarities with post-quantum cryptography (PQC), which will protect all computer systems and communication against quantum computer attacks. Unlike with Y2K, we do not have a set date for when quantum computers will be able to break today’s cryptography. Still, when the day comes that quantum computers are able to break today’s cryptography, it will affect all of society. The impact could be particularly dangerous for large organisations and governments that depend on legacy systems. With IBM announcing a 1000 qubit quantum chip and an error-resistant 133 qubit chip, it is clear that advances are being made.

There has already been a concerted effort to develop quantum-safe cryptography, and it is becoming more widely deployed for commercial use. With Y2K, the industry made a concerted effort to reduce the risk of it causing significant impact. The same efforts should be made to prevent a data apocalypse in the future. It is a long process of adapting to the reality of quantum computing and post-quantum cryptography, but one which has already begun in earnest and will accelerate this year.

Artificial intelligence

The year 2023’s most significant digital story will undoubtedly continue to be a central theme in 2024. Like many new technologies, it will go from a novelty to routine, with regulations in place to keep it safe.

We have already seen cybersecurity agencies from governments around the world come together to work on security principles for AI, emphasising design, development, deployment, operations and maintenance. In fact, an agreement has been reached between the Council Presidency and the European Parliament on proposed harmonised rules for artificial intelligence – the so-called AI Law. These regulations aim to ensure that AI systems placed on the EU market and used in the union, are safe and uphold the values of the EU. Much of what the guidance lays out are the proposed safety mechanisms to control and regulate AI effectively and could apply to other areas of software development, such as supply chain security, threat modelling and even something as mundane as proper documentation.

On the other hand, we have already seen AI used for cybercrime (although it has not tended to be used in major hacks of large institutions yet). As with any new technology, there are those who want to use it for good or bad; AI will also help detect attacks and defend networks/companies. I would argue that as it has the potential to do so much, more efficiently than humans can, including the ability to correlate large datasets, it will become a strong ally to improve cybersecurity.

Cybersecurity and sustainability

On the surface, there seems to be little that unites the practices of ensuring that digital systems are secure and that companies and institutions are sustainable. However, there is an increasing consensus that the two are more connected than might be apparent initially.

Firstly, cyberattacks create waste. Time, money, electricity, and countless other resources must be expended to undo the damage of successful attacks. We have also seen attacks directly damaging the environment, such as water treatment facilities being remotely taken offline.

Secondly, achieving sustainability goals, whether in the ESG framework or not, requires deploying and monitoring new technology. These are largely Internet of Things devices – networks of CO2 sensors, micro-solar grids, etc. We have noted that since they involve hundreds or thousands of individual data connections, IoT projects have a vastly increased attack surface compared to traditional deployments. Hence, the same applies to sustainable projects.

Skills gap

A significant gap between the number and training of cybersecurity professionals that we need and the number we have has been an ongoing problem, but we predict that in 2024, progress will finally start being made.

Why? Because a situation in which a cybersecurity skills gap impacts 71% of organisations is not sustainable. It is simply the case that the problem has reached a point where it can no longer be ignored, and enough noise is being made that something will be done.

What will this be? Continually updated university-level training for cybersecurity professionals would be useful, but it would take several years for the next generation of professionals to make it through their training and into the workforce. Cloud-based third-party security solutions can also lower risk, but another potential answer is to cross-train and upskill within companies. For example, Utimaco is invested in the International School of IT Security AG, which offers a Master's in Applied IT Security and onsite and digital in-house training.

Infrastructure resilience

The fragility of our current ecosystem is underscored by the susceptibility of infrastructures to attacks, with the potential to disrupt entire systems. A scenario as simple as severing critical cables could regress us to a technological stone age, highlighting the urgent need for robust defences.

To address this vulnerability, numerous initiatives are underway to augment traditional terrestrial infrastructures with satellite-based solutions for communication and infrastructure. This introduces a new challenge; ensuring these space-based technologies are secure. Layering multiple security measures – such as encryption between satellites – on top of the infrastructure and its fundamental security will provide the high level of security required for critical data.

The future demands technological innovation and a foundation of trust and security to fortify our interconnected world.

As we can see, 2024 will be the year when many of the major themes that have been mounting up for years now will come to a head. It will be an interesting time for many industries. Still, cybersecurity, perhaps most of all, will be at the forefront of many of the major changes happening over the next year and for many more to come.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...