Cybersecurity: What Can We Expect In 2025?

In today’s interconnected world, an abundance of data empowers individuals and organisations to make smarter, faster decisions at every level – across systems, processes, and interactions.

However, as technology advances at a rapid pace, the threat of cybercrime grows in both scale and sophistication. This rising challenge underscores the urgent need for innovative solutions to safeguard sensitive information and strengthen systems against increasingly complex threats.

According to BT, British cybersecurity experts detect more than 46 million signals of potential cyber-attacks every day – logging more than 530 signals per second. 

Indeed, 2024 has been particularly challenging, with a wave of high-profile cyber incidents targeting critical sectors, especially healthcare. In the first half of the year, London hospitals suffered a ransomware attack, forcing the cancellation of several vital appointments. Meanwhile, Change Healthcare experienced one of the most severe cyberattacks ever seen in the U.S. healthcare system, highlighting the vulnerabilities within this critical sector.

Looking ahead to 2025, organisations and nations are likely to face continued turbulent times, shaped by evolving attack vectors, regulatory pressures, and the ongoing impact of geopolitical conflicts – requiring strategic preparation and advanced technologies.

The development of quantum-resistant cryptography

Digital computers have transformed information processing over the past few decades, but quantum computing is poised to take this progress to new heights. This is where Post Quantum Cryptography (PQC) enters the scene.

According to McKinsey’s conversations with tech executives, investors, and academics, 72 percent believe we see a fully fault-tolerant quantum computer will become reality by 2035. While this innovation could unlock groundbreaking advancements in various fields, it also brings significant risks. A major concern is the potential for quantum computers to break traditional encryption methods. KPMG reports that 73 percent of individuals in the United States believe “it’s only a matter of time” before cybercriminals harness quantum computing to disrupt cybersecurity protocols, posing a serious challenge to digital security.

Preparing for the quantum era necessitates a swift transition to cryptographic algorithms capable of resisting quantum threats.

By 2025, the introduction of quantum-resistant encryption is expected, representing a crucial step in strengthening digital security, particularly in sectors such as defence, government and banking. This shift to a quantum-secure economy demands a unified, global effort, with business and cybersecurity leaders collaborating to ensure that the digital infrastructure remains resilient.

To counterbalance this risk, it is worth mentioning that quantum computers could also help protect digital infrastructure on a global scale by enabling the creation of new cryptographic algorithms, far more resistant than current ones.

Increased Regulation

In the coming years, businesses will face increasing pressure from evolving regulations. Laws being introduced or updated in regions such as the EU, US, and Singapore will require companies to make significant investments in cybersecurity. These regulations will force businesses to balance the risks of non-compliance, which could include financial penalties and reputational damage, with the costs of implementing the required security measures.

Supply chain security will continue to be a key focus in 2025. Regulations like the EU's NIS 2 mandate that organisations protect not only their own systems but also the systems of their suppliers and customers. This means businesses will need to take a more comprehensive approach to securing their entire digital ecosystem, especially due to the unpredictability of attack location.

Out With The Old, In With The New

As cyberattacks become increasingly sophisticated, traditional security methods are quickly losing their effectiveness and need to be replaced. Traditional antivirus software is now outdated, making way for advanced technologies like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR). Similarly, Web Application Firewalls (WAF), powered by artificial intelligence, will replace traditional firewalls, offering a more adaptive defence. While these novel technologies are already in place, their wider implementation is expected in 2025. 

Geopolitical Tensions & Increased Cybersecurity Risks

Amid escalating geopolitical tensions, 2024 has witnessed cybersecurity emerge as a key component of both offensive and defensive strategies. As we move into 2025, with ongoing conflicts around the world, all nations must strengthen their security measures to prepare for and resist an increasingly unstable cyber environment.

By proactively addressing cybersecurity vulnerabilities, we can better equip ourselves to navigate the uncertainties and challenges that lie ahead in the coming year.

Vincent Lomba is Chief Technical Security Officer at Alcatel-Lucent Enterprise 

Image: Ideogram

You Might Also Read: 

Creating Successful Cybersecurity Solutions:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Means, Motives & Opportunities
Ireland - The EU's Data Repository »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.