Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementLogical Security

6 trends driving hardware cybersecurity innovation

By Simon Johnson, Asmae Mhassni
cyber security

Image from Pixabay

September 12, 2022

Spending on cybersecurity is expected to reach $458.9 billion by 2025 — an increase of more than $196 billion compared to 2021. As this growth progresses, the entire cyber ecosystem is being shaped and impacted by a variety of factors including environmental forces, technology inflection points, and security trends.

As the industry moves forward, it’s important to understand what key trends are impacting hardware security innovation so all involved can more strategically evaluate technology, resources and planning. First, a couple of caveats — it’s important to keep in mind that security trends can often be a reaction to what’s going on in the security ecosystem itself, rather than specifically something that gets created. Also, regulation is traditionally a precursor to creating a security trend. With that in mind, let’s dive in.

Environmental forces (such as political, economic, societal, technological, etc.) are increasingly cascading across the security landscape. Today, there are more devices, more data, more breaches, and even more regulation in the threat landscape. The publicity of attacks is driving increased anxiety for consumers, governments and companies. Compounding the issue is the fact that the ransomware industry is thriving. Once created uniquely by individual hackers, ransomware has now morphed to include Ransomware as a Service (RaaS) and enterprise-like cybercrime rings, resulting in singular solutions that can be leveraged en masse — and they’re generating hundreds of millions of dollars in ransoms.

Supply chain attacks are also now fair game for threat actors. Nation-states are increasingly attacking supply chains and using those attacks to serve a dual purpose — generating money and demonstrating weakness in Western systems. An additional target of cyberattackers is user data — the rise in number and size of data breaches has highlighted how much personal data is monetized. The industry is working to strike a balance between technologies that improve people’s lives versus empowering bad actors to invade privacy.

While environment factors impact hardware security, there are also a variety of infection points and security trends influencing the hardware security space. Let’s look at six (and keep in mind, this list is not exhaustive):

  1. The drive to the edge: The creation of 5G networks and the need for lower latency is pushing the boundaries of where computation is going to take place. Edge devices run many threads across many microservices. As a result, workloads are no longer monolithic, and data is being processed through an array of devices. To secure the weakest link, data needs to be protected at every step. But as these devices make their way to a growing number of physically insecure locations, those challenges are increasing dramatically.
  2. AI everywhere and data is becoming king: Artificial intelligence (AI) is becoming a predominant part of computing applications. While it will bring new use cases and insights, it also brings added challenges in privacy and security. It will require massive data quantities to operate efficiently and competitively, which means continued investment in acquiring, classifying, storing and monetizing data. Furthermore, data access, privacy, ownership and control are all areas of increasing competition and conflict.
  3. Quantum computing on the horizon: Having spent years in academic research, the quantum era is looking increasingly like it will be a reality within the next decade. The frightening consequence, at least from a security perspective, is the implications this could have on the foundations of cryptography (and the ability to solve incredibly difficult mathematical problems upon which it is built).
  4. Confidential computing as the next frontier in data security: Confidential computing has emerged as a way for infrastructure service providers to re-establish trust with tenants so third-party data is not visible. Achieving this at scale and across the variety of devices being introduced is a significant challenge. At the same time, the cost to the user of doing this in terms of performance and complexity still needs to be minimized before it can be adopted broadly (which Everest Research predicts could come as soon as 2026). However, advances in this space are being made across the industry.
  5. Evolving roots of trust: Users face a challenge of achieving confidence in a system built from a diverse set of silicon components and providers. Consistent protections are now expected from all CPUs, GPUs, sensors, FPGAs, etc. The industry and users are moving away from large and complex roots of trust and planning solutions across segments. Standardization, transparency and interoperability of security strategies and methods are key to addressing this end-to-end security.
  6. Overall trustworthy systems: While there has been a recent trend of hardware attacks, hardware and software can’t be separated. Trustworthiness is a system problem across the data, processor and platform components (of the entire lifecycle). This has a broad impact from making devices secure by default (a challenge with Internet of Things [IoT] devices, for example); improving supply chain practices; giving users more transparency and visibility into security functions, and more.

Over the last decade, innovation in the hardware security space has evolved dramatically — from a focus on applications and software to increased protections rooted deep in silicon. As threats have moved down the stack, hardware research and innovation has increased across the industry and with academia. This has also increased collaboration between organizations as they work to solve security issues together.

KEYWORDS: 5G cyber security data protection hardware breach quantum computing ransomware Security trends

Share This Story

Simon Johnson is Senior Principal Engineer at Intel.

Asmae Mhassni is Principal Engineer at Intel.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing