Skip to main content

25.04.2023 |

The struggle for supremacy between defenders and hackers involves the use of artificial intelligence, behavioural analysis and blockchain

Hackers and cyber defense experts are battling for supremacy using the latest technologies. Who will prevail depends on a deeper understanding of these innovations and their successful integration into cybersecurity. “”Capital”” has selected six technologies that are the future of cybersecurity.

Artificial intelligence and machine self-learning

Artificial intelligence is the trendiest buzz phrase of late and has huge applications in the cybersecurity sphere. In a sense, it also works somewhat like two-factor authentication. It works by confirming the user’s identity based on various parameters. AI is helpful if we add different layers of information and authentication to these parameters for the technology to analyze. Separately, AI is at the heart of building automated security systems, language processing, facial recognition and automatically stopping cyber attacks. At the same time, AI has been used by hackers to develop malware and automated breaches. AI is used by them to build fake images, profiles and videos that show things that never happened. Malicious actors can use machine self-learning for breakthroughs by providing incorrect data that confuses computer systems. Meanwhile, on the other side are cybersecurity professionals who use machine self-learning to examine information such as logins, transactions and communications in real time to identify potential threats.

Behavioural analysis

In the age of social sharing, analysing user behaviour online has been used to target internet ads to the right audience. But behavioral analysis is also increasingly applicable to the development of advanced cybersecurity technologies. Through this technology, certain patterns in system and network activities can be identified to prevent future threats. With the help of huge volumes of unfiltered data, professionals can use behavior-based tools, algorithms, and machine self-learning to determine what is normal behavior for everyday users and what is not. Such may be the increased transfer of data from a particular user device that signals a possible cybersecurity issue. Behavioral analytics has mostly been used in network activity, but its application in consumer devices is growing.

Built-in hardware authentication

Having a PIN and a password has long been insufficient to provide reliable protection for any device. Technologies such as embedded authenticators to confirm user identity are increasingly common. One of the most active in this area is Intel with its vPro chips, which are integrated into the hardware itself and use several authentication methods. This type of technology is particularly useful in the era of IoT devices, the number of which is steadily growing and so is the need for hardware authentication. According to a study by consultancy ABI Research, shipments of hardware authentication tools will reach 5.3 billion units by 2024.

Quantum computers

Although we’re still talking about them in the future tense, quantum computers can perform certain types of calculations far more efficiently than classical computers. For this reason, they pose a significant threat to current cryptographic security systems. Quantum computing has the potential to unlock secrets ranging from users’ personal finances to the defence strategy of entire countries. Thus, in time, hackers and states will be able to break current cryptographic protocols. For this reason, there is also a need for cybersecurity with quantum computers. The big players in the sector, such as Google, Microsoft, Amazon, IBM and Intel, are developing their own quantum computers, and their practical application is expected in at least a decade.

Blockchain cybersecurity

There is no doubt that blockchain can change the way we use the internet. By creating a decentralized system, the technology can provide a more secure and efficient way to manage digital information. It works based on recognition between the two parties to a transaction. By creating a record that cannot be altered and is fully encrypted, blockchain helps prevent fraud and malicious activity. Privacy issues can also be addressed in blockchain by anonymizing personal data and using permissions to prevent access.

Zero Trust model

As its name states (zero trust), this type of cybersecurity is based on the idea that the network is already compromised. Zero Trust says that any component of a computer or network system cannot be trusted, including the people who run it. Therefore, measures must be put in place to make systems and their components work properly, usually in a model with continuous checks and authentication. Which includes analysis of business-critical data and the flow of that information and automated monitoring.



Target audience

Digital skills for all

Digital skills for ICT professionals

Digital technology

Artificial Intelligence



Big data

Software engineering