Info Image

5 Cybersecurity Trends for 2024, According to NTT

5 Cybersecurity Trends for 2024, According to NTT Image Credit: Antonio Solano/BigStockPhoto.com

NTT yesterday announced five key trends the company expects to have a far-reaching impact on the security landscape in 2024 and beyond:

Security for the Age of AI – AI promises to impact both cybercriminal behavior and cybersecurity strategies in 2024. Malicious actors will use AI to continue to accelerate malware and exploit development and for passive reconnaissance work to identify targets, software and weaknesses. AI will also reduce the cost of attacks through automated workflows, enabling more sophisticated phishing and disinformation campaigns. However, AI will also impact cybersecurity strategies and technologies by enhancing detection and analysis capabilities, improving the response to disinformation, phishing, malware and anomalous behavior. It will also pave the way for automated, efficient security operations, addressing workforce challenges. The continued advancement of AI will also force conversations in the cybersecurity industry around better, more secure posture across all business functions. In addition, the recent release of the White House Executive Order on AI is expected to drive AI-related initiatives in both public and private sectors, further emphasizing the significance of proper AI security hygiene.

Safeguarding Trust in Election Results – 2024 will bring with it presidential campaigns in Taiwan and the United States. As a result, malicious actors will increasingly use generative AI to spread disinformation. This continues a concerning trend seen in recent elections, with bots and bot farms contributing to divisiveness and the dissemination of intentionally misleading or entirely false content, including quotes and memes. In addition, implementing essential cybersecurity measures for systems and ensuring physical security of voting machines, for example, remains critical.

Implementing a Zero Trust Framework – The security landscape is becoming increasingly cloud-native, emphasizing the need for enhanced authentication methods to counter emerging threats, such as bypassing MFA through techniques like JSON Web Token (JWT) injection attacks. As a result, Zero Trust will evolve from hot trend to a framework that will be implemented across many parts of organizations to enhance security defenses.

Preparing for the Looming Quantum Threat – While 2024 is unlikely to be the year where we see widespread adoption of quantum technology by hackers and threat actors due to its nascent stage and substantial costs in comparison to existing effective methods, there is an urgency to prepare for its arrival. Measures are already underway with the White House issuing a memo instructing federal agencies to initiate their preparations and NIST publishing draft versions of several potential Post-Quantum Cryptography (PQC) algorithms. Given the extensive time required to migrate systems, in 2024 we will see a continued focus on preparing systems and applications for the adoption of quantum computing. The challenge ahead lies in managing the security of encryption for those without access to quantum capabilities, as well as defending against those who possess such capabilities once they become more prevalent.

Advancing Cryptography and Encryption in 2024 – In 2024, we expect to see cryptography and encryption research continue to explore new ways to safeguard data, both at rest and in the cloud. The evolution of advanced encryption systems, like ABE (attribute-based encryption), presents an intriguing prospect for real-world adoption. However, concerns of privacy remain due to the absence of assured privacy in interactions with AI models. As these interactions may involve even more sensitive information than conventional search queries, it's conceivable that researchers will delve into the prospect of enabling private engagements with such models.

With the advancement of technologies such as artificial intelligence and quantum computing, 2024 will be the year that organizations implement and innovate through technology, according to NTT. Not only will businesses implement a Zero Trust strategy as a baseline cybersecurity practice, but they will also begin to capitalize on advanced cybersecurity technologies made possible through fundamental research and R&D such as ABE to safeguard their business, data and preserve privacy

Mihoko Matsubara, Chief Cybersecurity Strategist, NTT

Cyber criminals and state actors are already taking advantage of generative AI to create phishing campaigns, write malicious code or identify vulnerable systems to exploit. However, AI capabilities are not only being used for nefarious purposes. Cybersecurity professionals have also found generative AI helpful to automate some tasks, data analysis and vulnerability research. For example, NTT Security’s research noticed that generative AI maximized the efficiency and accuracy to identify phishing sites quickly.

David Beabout, Chief Information Security Officer, NTT Security

While the security of voting machines has improved, it remains a concern among voters. The ability to validate and log results manually to address questionable issues will become increasingly important in the United States. This shift toward resiliency and result validation is expected to gain more prominence in 2024.

Taro Hashimoto, CSIS Visiting Fellow & Senior Manager of Cybersecurity, NTT

Zero Trust is no longer a buzz word, but a core concept that organizations will implement to improve their cybersecurity measures. The concept of Zero Trust is all about risk-based management and continuous process. This includes the implementation of a variety of underlying technologies, including Identity and Access Management (IAM), Endpoint Detection & Response (EDR), Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Security Information & Event Management (SIEM), etc. that seamlessly integrate within an organization’s cybersecurity strategy.

Kazuhiro Gomi, President & CEO of NTT Research

While the timing of threats posed by scalable quantum computers is still speculative, the need to prepare for this threat is real. With NIST's expected release of more PQC standards in 2024, industries, governments, and others are expected to begin ramping up their migration planning efforts. This is based on the concern that malicious actors are currently collecting ongoing communication data and could compromise security once scalable quantum computers become available. In this regard, it's important to note that cryptography researchers are working on fortifying the security of advanced cryptographic methods, such as attribute-based encryption (ABE), for PQC readiness.

Dr. Brent Waters, Director of the Cryptography & Information Security (CIS) Lab, NTT Research

One potential area of interest across the cryptography research community is to expand private search queries to encompass private interactions with AI systems. The rapid rise and utility of large language models like ChatGPT has transformed various industries. However, privacy concerns could be holding back the potential of these technologies. I imagine that the research community will examine the possibility of having private interactions with these types of AI technologies.

NEW REPORT:
Next-Gen DPI for ZTNA: Advanced Traffic Detection for Real-Time Identity and Context Awareness
Author

Principle Analyst and Senior Editor | IP Networks

Ariana specializes in IP networking, covering both operator networks - core, transport, edge and access; and enterprise and cloud networks. Her work involves analysis of cutting-edge technologies that drive application visibility, traffic awareness, network optimization, network security, virtualization and cloud-native architectures.

She can be reached at ariana.lynn@thefastmode.com

PREVIOUS POST

Anti-Censorship Segment Fights Back: Internet Users to Regain Full Freedom with New Web VPN Service

NEXT POST

LTE increases data usage and pushes the market for WiFi