The patriotic British tune Rule Britannia exclaims the nation’s delight in its sturdy navy – the drive that enabled it to safe worthwhile commerce routes and a create pan-global empire. A contemporary revision should swap ships for CPU chips, as computing and technological would possibly mark out this age’s superpowers. 

Whereas we revise it, nonetheless, we needs to be aware that not less than one historic comparability can stay intact. Nonetheless true, from that age of empire-building, is the concept energy is inconsistently shared – largely cut up between behemoth personal corporations and nation states, with smaller companies and people carried alongside within the wash they create. How lengthy it stays true for, is up for debate.

Concerning the creator

Dustin Brewer, Principal Futurist, ISACA.

Energy on this new, digital world is just not solely a query merely of who controls the flows of information and data. Nonetheless, there may be an attention-grabbing multiplier impact that performs a big function at present wherein providers are utilized by which corporations (AWS, Google, and many others.,) – the organisations who management essentially the most knowledge can have essentially the most highly effective processors to utilize it, offering extra worth and attracting extra prospects and their knowledge. 

Nonetheless, as there are such giant quantities of information, and so many main and various sources, insights could be drawn by anybody. The longer term (and its safety), it appears, belongs to these with the computing would possibly and the analytical heft to make sense of all of it and switch it to their very own benefit. The yr 2020 will mark a confluence of three themes that can carry this sharply into focus. 

Whereas there’s nonetheless a thirst for huge flows of information, it needs to be recognised that for cybersecurity not less than, even tiny quantities could be extraordinarily impactful, if the appropriate instruments are used. Only a few items of data from nameless data-sets are wanted to determine people and assemble vivid profiles or a “sample of life“ of them from open-sourced and even social media data. If you own these data sets (say, for instance, through monitoring users’ activity on large ecommerce websites or web-search platforms), then it’s even easier to pull deeply individualised insights from the raw material.

Adding to this are proliferating developments in AI and ML techniques, which can pull crucial information from data sets — completing the profile-building process at blistering speeds. These tools are not restricted to benign individuals or groups, and are becoming very easy to acquire and use – so their offensive capabilities will be felt much more keenly in the coming 12 months. 

One key additional note, when discussing data, is privacy. Cybercrime victims are often alerted to the criminal use of their data. But what happens when it’s not a criminal, and the questionable use of data is not so clear-cut? 2020 will mark a growing awareness and debate around corporate and state use of new forms of data, and the extent they use the information we willingly share. Even the U.S. Federal Government is beginning to look at legislation for data privacy. 

Headlines about facial recognition in public, “alternative” data used in credit reporting to decide what access to finance we get, and creepy social credit systems already abound. The legal use of these incredibly efficient and intelligent systems to use data for potentially intrusive purposes will be the major debate next year, making it plain that when considering cybersecurity as a whole, the ideological split in what makes a good and bad actor is going to become blurred in places. 

Raw Power

Computing power is being democratised – and we need to urgently consider the potential threats and vulnerabilities this creates. Quantum technology is undoubtedly a route to extremely powerful processing capabilities. The major developers in this field are making headlines with each breakthrough – delivering results previously unimagined. This sort of power can have unpredicted consequences when directed at both seemingly responsible or nefarious purposes. 

One particular use of quantum technology needs careful examination. Quantum systems may be able to read encrypted software and messages in a matter of hours – eroding the best standard of privacy we have today. At the same time, quantum communications can create messages that are impossible to break into or alter – ultimate security for those who need it, whatever their purpose. 

At the same time quantum computing may come with its own unique security flaws and issues. One researcher postulated that quantum computing is impossible due to unknown and uncontrollable variables at the “microscopic level.” While making such a bold statement may cause some to disregard this claim, it should be cause to think about the possibilities of utilizing the unknown for data encryption and security purposes. 

This however hasn’t stopped companies and countries from pouring massive amounts of time and money into research and development. China is reportedly spending $10 billion to build a quantum research facility for such purposes. This technology is still in its embryonic stage and needs a period of development before it’s ready for use in governments, corporate or consumer spheres – but it’s crucial to track its progress and ensure it’s being used for humanity’s gain, not harm.

Still, as long as these capabilities are specialised, and the machines expensive enough that they can be kept from the world of cyber-crime, we will be OK. Right? Well, for good or for bad, there have been some (undeniably very impressive) breakthroughs in the last few months, that goes some way towards opening this technology up to the world. 

The Quantum Communications Hub has developed chip-scale quantum communications, paving the way for QKD to be integrated into small devices. Microsoft and others are actively promoting quantum algorithms that will run on a classical computer and Amazon is promoting its Braket platform on AWS to get developers and scientists to start experimenting with the technology. 2020 will certainly be a year where these developments in quantum really become widely known, and these questions will become urgent.

Default positions

Image and reputation still arguably hold just as much power as an organisation’s actual computing clout. Businesses and consumers in some regions are now significantly nervous about a cyber-attack from potential geopolitical adversaries. Often anxieties arise as those businesses or individuals are swept up in a political narrative, sometimes one which overplays attack risks. This nervousness then changes the way businesses, governments and consumers behave. 

The default position effect may be seen in the private industry as well, with special relevance when we consider privacy and access to our personal data. Google and Facebook, common targets for attack on this topic, still enjoy valuable custom among huge percentages of the global population. Their dominance (though they’re by no means the only ones) means consumers and businesses have little choice but to engage, placing trust in the companies to keep data safe. In return that data is fuel for the algorithms that allow ever more intrusive and granular targeting of consumers. 

Concluding

The coming year will see serious security challenges presented by all three areas – efficiency from improved analytics, cloud computing power and market momentum – which make challenging the status quo difficult. Whether or not the future will be owned by firms with raw technological might, any defensive or risk-management strategy must heed these global themes, investigate the impact on their organisations and users, and chart a course through.

Source link