Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

A new crystal ball: A view of the trends that will shape 2021

By Ashvin Kamaraju
The Cyber 101 Discussion
December 31, 2020

About this time of year, all kinds of companies in a variety of sectors engage in the crystal-ball gazing tradition of making predictions for the future. But along came 2020, and amazingly, even in a year like no one could have imagined, some of last year’s predictions were still spot on, except for one huge exception: timing.

Predictions about digital and cloud transformation, 5G, cybersecurity, mobile banking, biometrics and more are all there in black and white from 2019 (and sometimes even before), but what no one predicted was the unprecedented hyper speed at which these technologies  came at us. The pandemic turbo charged the entire technology engine with the seismic and sudden shift to a remote and mobile world.

Trends that emerged in 2020, along with some new predictions, will have a huge impact on 2021 as these technologies continue to evolve and deploy even more quickly. Adoption of emerging tech will be even faster next year and securing data in these environments must finally move to the top of the priority list because more depends on security than ever before.   

A Distributed Workforce is Here to Stay and Will Evolve to Arenas Never Imagined   

The remote work trend, already steadily increasing pre-pandemic, accelerated exponentially in 2020 as a result of the pandemic Some workers will return the office, but many will indefinitely continue to work from anywhere. The lessons learned in 2020 will force IT organizations to invest more in physical and digital security to address new threat vectors resulting from a remote work culture. With more and more devices connected to networks, employee cybersecurity training will become a top business initiative as individual accountability increases. Organizations will require more cyber distancing to reduce the mixing of personal devices and corporate data to support compliance requirements. There will also be a new wave of remote workers. While the first wave was white-collar workers in the service industry, the second wave will include supply chain and manufacturing workers  made possible because of technologies such as telexistence.  

The Password Will Finally Disappear as Digital Identity Becomes a Great Equalizer   

As mobility reached a new level of critical need in 2020, the need for digital identity capabilities also crystalized. Lockdowns and remote work on a global level meant strong identity verification became the lifeblood for enrolling new customers, payment data encryption, and multiple authentication schemes, including biometrics. In the New Year, digital identity capabilities will become the great equalizer in the fight against fraud. Financial services, healthcare, government, mobile and other industries will need to build and maintain trust as data breaches continue with regularity and compliance mandates get more stringent.   

The Fight for Data Privacy Will Make Bigger Headlines

Demand for privacy protection, snowballing for years, stole much of the spotlight in 2020 as data breaches soared. Global Data Protection Regulation (GDPR) fines added up and the first company to be fined under the California Consumer Privacy Act (CCPA) surfaced, all while individual states continued to refine their privacy laws. The sudden invalidation of the legal framework known as Privacy Shield, by European Union ruling called Schrems II, dealt a blow to nearly 6,000 companies in the U.S. who rely on trans-Atlantic data flows, renewing debate over whether and when a federal privacy law might come into existence. With consumers’ heightened awareness of their privacy rights, companies that leverage data discovery technologies and protect sensitive data (with encryption) will keep themselves out of unwanted headlines in 2021.  

5G Will Provide New Capabilities and the Biggest Attack Surface Ever

As expected, 5G began to fuel the proliferation of IoT. The push for more mobile services, demand for streaming, touchless interactions via mobile devices and the need to accommodate a remote workforce sped up appetite for this new generation of capabilities. In 2021, the continuation of the 5G rollout which will allow billions of connected devices, will create the largest attack surface that’s ever existed, making early threat detection a top protector of data. Enterprises and employees, eager to capture new capabilities, must make access management, authentication and data discovery a top priority as data sprawl pushes the boundaries of computing devices.

Cybercrime Rings Will Be Well Funded and Motivated    

As organizations – including hospitals and other healthcare entities – struggled to contend with the global pandemic, organized cybercrime rings wreaked havoc. Ransomware-as-a-Service rose up with an alarming potency that crippled government agencies, schools and businesses. Unfortunately, one of the biggest threats in the New Year will be devastating: The United Nations estimates that organized cybercrime will cost the global economy around $5.2 trillion between now and 2025.

In Response, Businesses Will Take the Fight to the Hackers

It was predicted that the volume and efficacy of cyberattacks would increase in 2020, but no one knew the true extent and speed to which malware and ransomware would explode. In 2019, there was a 41% increase in ransomware attacks, and this number skyrocketed this year. For 2021, Cybersecurity Ventures predicts that a business will fall victim to an attack every 11 seconds, and the estimated cost to businesses will be around $20 billion. In the New Year, business will finally take the fight to hackers and go on the offensive by using deceptive technology to proactively set traps and allow access to fake data to frustrate attackers. These tactics, along with multi-factor authentication and access management controls, will reign supreme.

Quantum Will Make Significant Headway

The race for quantum supremacy is on as major players like Amazon, Google, IBM and others heavily invest in research and development. Advances made in 2020 will drive momentum in the New Year. Universally regarded as among the most significant threat to cybersecurity in history, quantum computing in the hands of bad actors will put data protected by today’s conventional encryption methods at risk. Enterprises that hold the world’s most sensitive data have no time to waste in rolling out plans for enabling quantum-resistant algorithms in the data security products they deploy.     

While 2020 definitely threw us all for a loop, one thing remained clear…innovation continued to thrive. Here’s to an exciting 2021, as we look forward to watching the proverbial cybersecurity envelope get pushed and technology areas we have been monitoring for some time finally begin to take shape.

 

KEYWORDS: cyber security information security remote work risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ashvin kamaraju

Ashvin Kamaraju is Vice President of Engineering at Thales. He leads the product engineering and technology strategy for Thales’ Cloud Protection & Licensing business, leading a global organization of engineers and researchers that develop the technology for the company’s portfolio of industry-leading data protection and access management products and services. Previously Ashvin served as Vice President Global Engineering at Thales eSecurity following its acquisition of Vormetric. Prior to joining Vormetric, Ashvin spent four years as General Manager and Vice President of Engineering at Symantec Corporation, where he led the development of a portfolio of enterprise storage software products. Ashvin is an experienced leader with a proven track record, having more than 25 years of software development experience with domain experience in storage management, operating systems, big data security, encryption and key management.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1019-cyber-Feat-slide1_900px

    New challenges for AI, data privacy and the 5G hackathon

    See More
  • SEC0819-Edu-Feat-slide1_900px

    2020 Cybersecurity Predictions: Four 2019 Trends That Will Solidify in the New Year

    See More
  • Laptop with crumbled papers

    Automation and a “back to basics” approach will shape cybersecurity

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!