Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business Resilience

Future-proofing data against hackers

By Venkata Josyula
future-proofing your enterprise's data against hackers
December 23, 2020

Despite many companies' best efforts to combat cybercrime, it persists and is increasingly costly. Some estimates show cybercrimes could cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. With more Americans online than ever before because of COVID-19, cases have surged 300 percent, according to the FBI’s Cyber Division. It now receives between 3,000 and 4,000 cybersecurity complaints daily -- up from 1,000 per day before the pandemic.

The reason for the rise? As enterprise security moves into the home, hackers are exploiting weaknesses for big profits. Financial gain is the key driver for cybercrime with nearly nine in 10 (86%) breaches being financially-driven. Most of them (70%) are caused by external bad actors who steal credentials and use techniques like phishing to compromise businesses and individuals alike.

We must make our digital world safer, but doing that in a world where enterprises are being asked to make data more useful while adhering to regulatory requirements is a mounting challenge. What is needed is a new security paradigm for the future that goes beyond network infrastructure and network security. We need solutions that consider the full lifecycle of data at rest, in transit, and in use. 

This new view of security encompasses everything from public and private networks to the cloud, to local servers and individual endpoints transmitting data over high-speed 4G LTE and 5G networks. Efforts are also looking at ways to harness the properties of quantum physics to create near provably secure encryption.

Here’s a look at some of the latest technologies that may be able to turn the tide against malicious hackers because they can still deliver performance and function at the necessary scale.

Start with the network

As network operations become more complex in the 5G era, they will revolutionize many aspects of commerce and our personal lives. From faster speeds to unlocking a proliferation of Internet of Things devices, the power of 5G requires more powerful security.

It also means additional hardware and software supporting security functions such as firewalls, intrusion detection, denial of service detection and network probes. Security is the foundation of any new 5G network to protect against threats to customers and ensuring the reliability and resilience of communications services against all manner of hazards, including cyber threats.

Who can you trust? Nobody

The future of cybersecurity has no trust, and that’s a good thing. The reality is that encryption has long been the common way to secure data and rest and in transit, but it’s far from perfect and largely ignores how to protect data while it’s in use. Imagine someone in your IT department managing a sensitive database. How can we ensure that your organization’s sensitive data is protected even from malicious internal users?

That’s why the evolving Zero Trust Architecture standard is so important. It offers an effective network security model where no person or device is trusted to access critical company assets without real-time authentication and authorization, whether they are sitting inside an organization’s network perimeter or remotely accessing the network from outside.

An example of a zero-trust approach is applying software-defined perimeters (SDP) to networks. SDP sits between users and servers and applies multifactor authentication to defeat credential theft. It also isolates servers to defeat server exploitation such as attacks on vulnerabilities and configuration errors and encrypts all traffic in impregnable tunnels to deter man-in-the-middle attacks. Finally, its ease of use reduces attempts to circumvent the system just to make daily operations easier.

Homomorphic encryption can also enable new services by removing privacy barriers inhibiting data sharing. For example, predictive analytics on shared data in healthcare can be hard to apply due to medical data privacy concerns, but if the predictive analytics service provider can operate on encrypted data instead, these privacy concerns are diminished.

Quantum physics to the rescue?

Advances in quantum computing have huge security implications and impact consumers and enterprises. With quantum key distribution (QKD), encryption keys are continuously generated; unauthorized attempts to see this data on the quantum channel can be immediately detected since any disruption to the channel breaks the quantum state of photons signaling eavesdroppers are present. Data can be better secured with keys generated using a Quantum Random Number Generator (QRNG) that creates truly random numbers that can’t be predicted.

These are just a few examples of the latest thinking in security as technology evolves to stay one step ahead of cybercriminals and protect your organization’s data.

 

KEYWORDS: cyber security data security quantum computing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Venkata Josyula is a Director in Verizon's Technology and Product Development team, driving emerging technologies to enable new products and services. He has 20+ years of experience working in various leadership and engineering roles and led teams on IP / MPLS network architectures, traffic engineering and routing protocols, SDNs, cloud infrastructure, large scale platform and application development. His current areas of focus include cybersecurity, A.I / ML and quantum communications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • city

    Future-proofing your organization against the unknown

    See More
  • password-freepik

    Going passwordless: Future-proofing your digital identity

    See More
  • Future-Proofing with Smart Card Investments

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing