ABI Research’s new whitepaper presents critical and actionable cybersecurity trends and forecasts.
Global cybersecurity spending in industrial critical infrastructure sectors (e.g., energy, transport, and water & waste management) is expected to hit $US23 billion by the end of 2022 and grow at a CAGR of 10 per cent to reach $US36.67 billion in 2027. This is just one of the forecasts in The State of Cyber & Digital Security whitepaper by global technology intelligence firm ABI Research.
“Businesses, industries, and in fact the entire world, have never been more connected than they are right now. They have also never been more at risk. Organizations and verticals continue to integrate technologies like the Internet of Things (IoT), 5G, and blockchain, meaning more points of connection—and points of vulnerability—than ever before. As a result, ensuring “security” is not just a hardware issue or a software issue—it is a web of challenges and solutions spanning entire technology ecosystems, explains Michela Menting, Digital Security Research Director at ABI Research. “ABI Research understands this challenging and complex reality, and that is why our research explores the cyber and digital security landscape in its entirety. This whitepaper presents critical and actionable cybersecurity trends and forecasts from our seven cyber and digital research services.”
Some trends presented in the whitepaper include:
Citizen Digital Identity
Growing Presence of Mobile Identities: Driven by digital transformation and governments’ growing appetites to extend digital platform offerings, significant uptake of mobile identities has resulted. Mobile identities, as a companion to physical documentation, once provisioned digitally via a dedicated application or web-based solution, enhance citizen use cases and allow for Identification (ID) verification using no superfluous citizen data.
Cybersecurity Applications
The Emergence of Next-Generation Cryptography: The concern with quantum-safe technologies is becoming a high priority as the advent of attack-capable quantum computers emerge on the horizon. The imminent release of draft quantum-resistant cryptographic algorithms (known as Post-Quantum Cryptography (PQC)) by the U.S. National Institute of Standards and Technology (NIST) has security and technology vendors on the starting line, ready to integrate and deploy them in their product lines.
Digital Payment Technologies
Central Banks Embracing Digital Currency: The digitization of a country’s fiat currency involves the central bank of the economy in question issuing electronic tokens, instead of the usual process of minting coins and printing paper bills. There can be no doubt that recent years have seen the concept of Central Bank Digital Currencies (CBDCs) explored with great intent by many global economies.
Industrial Cybersecurity
Critical Infrastructures Primed to Adopt Enabling Cybersecurity Solutions: Industrial operators are increasingly incorporating disruptive technologies in their migration to Industry 4.0, driving better appreciation of cybersecurity requirements in of enabling technologies with demand for fast user switching, hot patching, ICS cloudification, network probes, and secured PLC programming, among others.
IoT Cybersecurity
Optimizing Data Security in Telematics to Enable Intelligence-Driven Monetization: Secure data management for automotive telematics is becoming increasingly important for vehicle manufacturers (VMs), Tier One suppliers, telcos, and insurance companies. Almost every aspect of the software-defined vehicle is set to include constantly evolving cybersecurity technologies at the hardware, software and network level, with telematics data security being one of the core operations.
Telco Cybersecurity
The Drive Toward Embedded Cellular Connectivity Continues: With the hyper-connected world on the horizon, the drive toward embedded cellular connectivity continues, served via Subscriber Identity Module (SIM) form factors, such as eSIM and Integrated SIM (iSIM). From consumer electronics, cutting across a variety of device types from smartphones, tablets, laptops, and wearables to myriad Machine-to-Machine (M2M) and IoT applications
Trusted Device Solutions
The Impact of a Remote Workforce: Distributed working environments affect both workers and assets (IT, OT, and the IoT). Secure connectivity and identity management have become key priorities in disparate and heterogenous networks. All these elements are driving demand for hardware security.