Cybersecurity: What Can We Expect In 2025?

In today’s interconnected world, an abundance of data empowers individuals and organisations to make smarter, faster decisions at every level – across systems, processes, and interactions.

However, as technology advances at a rapid pace, the threat of cybercrime grows in both scale and sophistication. This rising challenge underscores the urgent need for innovative solutions to safeguard sensitive information and strengthen systems against increasingly complex threats.

According to BT, British cybersecurity experts detect more than 46 million signals of potential cyber-attacks every day – logging more than 530 signals per second. 

Indeed, 2024 has been particularly challenging, with a wave of high-profile cyber incidents targeting critical sectors, especially healthcare. In the first half of the year, London hospitals suffered a ransomware attack, forcing the cancellation of several vital appointments. Meanwhile, Change Healthcare experienced one of the most severe cyberattacks ever seen in the U.S. healthcare system, highlighting the vulnerabilities within this critical sector.

Looking ahead to 2025, organisations and nations are likely to face continued turbulent times, shaped by evolving attack vectors, regulatory pressures, and the ongoing impact of geopolitical conflicts – requiring strategic preparation and advanced technologies.

The development of quantum-resistant cryptography

Digital computers have transformed information processing over the past few decades, but quantum computing is poised to take this progress to new heights. This is where Post Quantum Cryptography (PQC) enters the scene.

According to McKinsey’s conversations with tech executives, investors, and academics, 72 percent believe we see a fully fault-tolerant quantum computer will become reality by 2035. While this innovation could unlock groundbreaking advancements in various fields, it also brings significant risks. A major concern is the potential for quantum computers to break traditional encryption methods. KPMG reports that 73 percent of individuals in the United States believe “it’s only a matter of time” before cybercriminals harness quantum computing to disrupt cybersecurity protocols, posing a serious challenge to digital security.

Preparing for the quantum era necessitates a swift transition to cryptographic algorithms capable of resisting quantum threats.

By 2025, the introduction of quantum-resistant encryption is expected, representing a crucial step in strengthening digital security, particularly in sectors such as defence, government and banking. This shift to a quantum-secure economy demands a unified, global effort, with business and cybersecurity leaders collaborating to ensure that the digital infrastructure remains resilient.

To counterbalance this risk, it is worth mentioning that quantum computers could also help protect digital infrastructure on a global scale by enabling the creation of new cryptographic algorithms, far more resistant than current ones.

Increased Regulation

In the coming years, businesses will face increasing pressure from evolving regulations. Laws being introduced or updated in regions such as the EU, US, and Singapore will require companies to make significant investments in cybersecurity. These regulations will force businesses to balance the risks of non-compliance, which could include financial penalties and reputational damage, with the costs of implementing the required security measures.

Supply chain security will continue to be a key focus in 2025. Regulations like the EU's NIS 2 mandate that organisations protect not only their own systems but also the systems of their suppliers and customers. This means businesses will need to take a more comprehensive approach to securing their entire digital ecosystem, especially due to the unpredictability of attack location.

Out With The Old, In With The New

As cyberattacks become increasingly sophisticated, traditional security methods are quickly losing their effectiveness and need to be replaced. Traditional antivirus software is now outdated, making way for advanced technologies like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR). Similarly, Web Application Firewalls (WAF), powered by artificial intelligence, will replace traditional firewalls, offering a more adaptive defence. While these novel technologies are already in place, their wider implementation is expected in 2025. 

Geopolitical Tensions & Increased Cybersecurity Risks

Amid escalating geopolitical tensions, 2024 has witnessed cybersecurity emerge as a key component of both offensive and defensive strategies. As we move into 2025, with ongoing conflicts around the world, all nations must strengthen their security measures to prepare for and resist an increasingly unstable cyber environment.

By proactively addressing cybersecurity vulnerabilities, we can better equip ourselves to navigate the uncertainties and challenges that lie ahead in the coming year.

Vincent Lomba is Chief Technical Security Officer at Alcatel-Lucent Enterprise 

Image: Ideogram

You Might Also Read: 

Creating Successful Cybersecurity Solutions:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Means, Motives & Opportunities
Ireland - The EU's Data Repository »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Turkish Accreditation Agency (TURKAK)

Turkish Accreditation Agency (TURKAK)

TURKAK is the national accreditation body for Turkey. The directory of members provides details of organisations offering certification services for ISO 27001.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

Harrison Clarke

Harrison Clarke

Harrison Clarke is a leading staffing and recruiting firm in the Cloud, Cybersecurity, Data & AI space.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.