Go to listing page

Harbingers of Doom or Rays of Hope? These 10 Trends Will Determine the Course of Cyberspace in 2020

Harbingers of Doom or Rays of Hope? These 10 Trends Will Determine the Course of Cyberspace in 2020

Share Blog Post

“My momma always said, ‘Life was like a box of chocolates. You never know what you're gonna get.’” -Forrest Gump

Like the famous quote from Forrest Gump, every year brings new surprises in cybersecurity, some pleasant and some not so much. It is very much certain though that cybersecurity is a prime concern for most organizations. A range of ever-evolving cyber threats, new security technologies, and privacy and security legislation, are just some of the factors that will shape the cyberspace this year. Read on to find out more about the key trends to watch out for in 2020. 

  1. Data security will remain a growing concern for all organizations amidst frequent data breaches due to unsecured cloud databases. With new data privacy regulations such as the California Consumer Privacy Act (CCPA) coming into effect this year, organizations will be under greater pressure to clean up their act and improve their security standards.
  2. With the continued rise of online payments and open banking technologies, the financial sector will continue to be a lucrative target for international cybercrime gangs. Whether it is in the form of card skimming attacks, attacks on bank systems, or cryptocurrency hacks, financial motives will drive a huge amount of cybercrime.
  3. The traditional approach to cybersecurity with the focus on perimeter security, preventive security solutions, and incident management will make way for new solutions powered by security automation to enable a threat-based detection and response strategy and zero-trust model for cyber defense.
  4. Ransomware attacks are a top threat for numerous sectors such as education, healthcare, and the government sector. Going ahead, ransomware actors are not likely to apply brakes on their operations, with new variants of ransomware and threats of releasing victims’ data being unleashed now on a regular basis.
  5. The introduction of Machine Learning and AI technologies has given rise to new threats such as Deepfakes. While security solutions will adopt these technologies to improve cyber defense, threat actors could also get their hands on this tech to further propagate their malicious activities with data poisoning, detection evasion, and other techniques.
  6. Due to the growing cyber risk, the government is expected to ramp up efforts to consolidate information sharing and vulnerability disclosure practices for all civilian agencies. On the legislative side, the government is expected to pass new laws to address security concerns surrounding critical infrastructure facilities, IoT devices, 5G communications, and more.
  7. On the world map, the line between state-sponsored cyber operations and geopolitical affairs is becoming thinner day by day. By leveraging tensions between contrasting global powers, highly resourceful state-linked actors will likely lead the front in what experts call a “cyber cold war.”
  8. Alongside automation and threat-based cyber defense, organizations will look to reduce the complexity of their security operations through the integration of disparate security functions such as threat intelligence, threat hunting, and incident response. The year 2020 will be the keystone for Gartner’s prediction of up to 50% adoption of this approach by 2022.
  9. Security starts with hardware and it is certainly on the crosshairs of threat actors. Whether it is bugs in existing processor and firmware designs or entirely new types of hardware such as connected cars, smart building systems, and Virtual Reality (VR) devices, hardware security will be a major challenge going forward.
  10. Phishing has remained a multi-billion dollar attack vector over many years for cybercriminals worldwide. From simple “too good to be true” baits to sophisticated impersonation tactics and Business Email Compromise (BEC) attacks, threat actors will continue evolving their methods to target a wide range of targets in 2020 through phishing.


threat intelligence
ransomware attacks
security automation
cyber fusion

Posted on: January 17, 2020

More from Cyware

Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.

The Virtual Cyber Fusion Suite