Cybersecurity: What Can We Expect In 2025?

In today’s interconnected world, an abundance of data empowers individuals and organisations to make smarter, faster decisions at every level – across systems, processes, and interactions.

However, as technology advances at a rapid pace, the threat of cybercrime grows in both scale and sophistication. This rising challenge underscores the urgent need for innovative solutions to safeguard sensitive information and strengthen systems against increasingly complex threats.

According to BT, British cybersecurity experts detect more than 46 million signals of potential cyber-attacks every day – logging more than 530 signals per second. 

Indeed, 2024 has been particularly challenging, with a wave of high-profile cyber incidents targeting critical sectors, especially healthcare. In the first half of the year, London hospitals suffered a ransomware attack, forcing the cancellation of several vital appointments. Meanwhile, Change Healthcare experienced one of the most severe cyberattacks ever seen in the U.S. healthcare system, highlighting the vulnerabilities within this critical sector.

Looking ahead to 2025, organisations and nations are likely to face continued turbulent times, shaped by evolving attack vectors, regulatory pressures, and the ongoing impact of geopolitical conflicts – requiring strategic preparation and advanced technologies.

The development of quantum-resistant cryptography

Digital computers have transformed information processing over the past few decades, but quantum computing is poised to take this progress to new heights. This is where Post Quantum Cryptography (PQC) enters the scene.

According to McKinsey’s conversations with tech executives, investors, and academics, 72 percent believe we see a fully fault-tolerant quantum computer will become reality by 2035. While this innovation could unlock groundbreaking advancements in various fields, it also brings significant risks. A major concern is the potential for quantum computers to break traditional encryption methods. KPMG reports that 73 percent of individuals in the United States believe “it’s only a matter of time” before cybercriminals harness quantum computing to disrupt cybersecurity protocols, posing a serious challenge to digital security.

Preparing for the quantum era necessitates a swift transition to cryptographic algorithms capable of resisting quantum threats.

By 2025, the introduction of quantum-resistant encryption is expected, representing a crucial step in strengthening digital security, particularly in sectors such as defence, government and banking. This shift to a quantum-secure economy demands a unified, global effort, with business and cybersecurity leaders collaborating to ensure that the digital infrastructure remains resilient.

To counterbalance this risk, it is worth mentioning that quantum computers could also help protect digital infrastructure on a global scale by enabling the creation of new cryptographic algorithms, far more resistant than current ones.

Increased Regulation

In the coming years, businesses will face increasing pressure from evolving regulations. Laws being introduced or updated in regions such as the EU, US, and Singapore will require companies to make significant investments in cybersecurity. These regulations will force businesses to balance the risks of non-compliance, which could include financial penalties and reputational damage, with the costs of implementing the required security measures.

Supply chain security will continue to be a key focus in 2025. Regulations like the EU's NIS 2 mandate that organisations protect not only their own systems but also the systems of their suppliers and customers. This means businesses will need to take a more comprehensive approach to securing their entire digital ecosystem, especially due to the unpredictability of attack location.

Out With The Old, In With The New

As cyberattacks become increasingly sophisticated, traditional security methods are quickly losing their effectiveness and need to be replaced. Traditional antivirus software is now outdated, making way for advanced technologies like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR). Similarly, Web Application Firewalls (WAF), powered by artificial intelligence, will replace traditional firewalls, offering a more adaptive defence. While these novel technologies are already in place, their wider implementation is expected in 2025. 

Geopolitical Tensions & Increased Cybersecurity Risks

Amid escalating geopolitical tensions, 2024 has witnessed cybersecurity emerge as a key component of both offensive and defensive strategies. As we move into 2025, with ongoing conflicts around the world, all nations must strengthen their security measures to prepare for and resist an increasingly unstable cyber environment.

By proactively addressing cybersecurity vulnerabilities, we can better equip ourselves to navigate the uncertainties and challenges that lie ahead in the coming year.

Vincent Lomba is Chief Technical Security Officer at Alcatel-Lucent Enterprise 

Image: Ideogram

You Might Also Read: 

Creating Successful Cybersecurity Solutions:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Means, Motives & Opportunities
Ireland - The EU's Data Repository »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Partnership for Conflict, Crime and Security Research (PaCCS)

Partnership for Conflict, Crime and Security Research (PaCCS)

PaCCS delivers high quality and cutting edge research to improve our understanding of current and future global security challenges in areas including cybersecurity.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

CertNexus

CertNexus

CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).

True Corporation

True Corporation

True Corporation is Thailand’s leading Telecom-Tech company, empowering people and businesses with connected solutions that advance society sustainably.