Cybersecurity: What Can We Expect In 2025?

In today’s interconnected world, an abundance of data empowers individuals and organisations to make smarter, faster decisions at every level – across systems, processes, and interactions.

However, as technology advances at a rapid pace, the threat of cybercrime grows in both scale and sophistication. This rising challenge underscores the urgent need for innovative solutions to safeguard sensitive information and strengthen systems against increasingly complex threats.

According to BT, British cybersecurity experts detect more than 46 million signals of potential cyber-attacks every day – logging more than 530 signals per second. 

Indeed, 2024 has been particularly challenging, with a wave of high-profile cyber incidents targeting critical sectors, especially healthcare. In the first half of the year, London hospitals suffered a ransomware attack, forcing the cancellation of several vital appointments. Meanwhile, Change Healthcare experienced one of the most severe cyberattacks ever seen in the U.S. healthcare system, highlighting the vulnerabilities within this critical sector.

Looking ahead to 2025, organisations and nations are likely to face continued turbulent times, shaped by evolving attack vectors, regulatory pressures, and the ongoing impact of geopolitical conflicts – requiring strategic preparation and advanced technologies.

The development of quantum-resistant cryptography

Digital computers have transformed information processing over the past few decades, but quantum computing is poised to take this progress to new heights. This is where Post Quantum Cryptography (PQC) enters the scene.

According to McKinsey’s conversations with tech executives, investors, and academics, 72 percent believe we see a fully fault-tolerant quantum computer will become reality by 2035. While this innovation could unlock groundbreaking advancements in various fields, it also brings significant risks. A major concern is the potential for quantum computers to break traditional encryption methods. KPMG reports that 73 percent of individuals in the United States believe “it’s only a matter of time” before cybercriminals harness quantum computing to disrupt cybersecurity protocols, posing a serious challenge to digital security.

Preparing for the quantum era necessitates a swift transition to cryptographic algorithms capable of resisting quantum threats.

By 2025, the introduction of quantum-resistant encryption is expected, representing a crucial step in strengthening digital security, particularly in sectors such as defence, government and banking. This shift to a quantum-secure economy demands a unified, global effort, with business and cybersecurity leaders collaborating to ensure that the digital infrastructure remains resilient.

To counterbalance this risk, it is worth mentioning that quantum computers could also help protect digital infrastructure on a global scale by enabling the creation of new cryptographic algorithms, far more resistant than current ones.

Increased Regulation

In the coming years, businesses will face increasing pressure from evolving regulations. Laws being introduced or updated in regions such as the EU, US, and Singapore will require companies to make significant investments in cybersecurity. These regulations will force businesses to balance the risks of non-compliance, which could include financial penalties and reputational damage, with the costs of implementing the required security measures.

Supply chain security will continue to be a key focus in 2025. Regulations like the EU's NIS 2 mandate that organisations protect not only their own systems but also the systems of their suppliers and customers. This means businesses will need to take a more comprehensive approach to securing their entire digital ecosystem, especially due to the unpredictability of attack location.

Out With The Old, In With The New

As cyberattacks become increasingly sophisticated, traditional security methods are quickly losing their effectiveness and need to be replaced. Traditional antivirus software is now outdated, making way for advanced technologies like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR). Similarly, Web Application Firewalls (WAF), powered by artificial intelligence, will replace traditional firewalls, offering a more adaptive defence. While these novel technologies are already in place, their wider implementation is expected in 2025. 

Geopolitical Tensions & Increased Cybersecurity Risks

Amid escalating geopolitical tensions, 2024 has witnessed cybersecurity emerge as a key component of both offensive and defensive strategies. As we move into 2025, with ongoing conflicts around the world, all nations must strengthen their security measures to prepare for and resist an increasingly unstable cyber environment.

By proactively addressing cybersecurity vulnerabilities, we can better equip ourselves to navigate the uncertainties and challenges that lie ahead in the coming year.

Vincent Lomba is Chief Technical Security Officer at Alcatel-Lucent Enterprise 

Image: Ideogram

You Might Also Read: 

Creating Successful Cybersecurity Solutions:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Means, Motives & Opportunities
Ireland - The EU's Data Repository »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.