Unchartered: Where is Cyber Security Headed?

Photo by Markus Spiske on Unsplash

In the digital-first world, the shapeshifting and ever-evolving business and customer needs have left decision-makers scrambling to find the right digital transformation temperature to let their efforts simmer on.

A key consideration and a matter of consistent debate is the role of digital data privacy and cyber security. These two have been taking their protein shakes and creatine for the past couple of years, and the movements have gained enough momentum to inspire action.

Take a look at the increasing interest in the topic ‘Cyber Security’ over the past 5 years:

Screenshot by Author (Google Trends)

For some time now, it has been a commonly held belief that the digital space would be the next frontier for an all-out war, with just one click of a button, one digitally replicating virus crippling entire nations. In fact, Accenture observes a 125% year over year cyberattack increase in incident volume- across all industries and geographies.

A certain art gallery scene comes to mind:

Q: I’ll hazard I can do more damage on my laptop sitting in my pajamas before my first cup of earl grey than you can do in a year in the field.

007: Oh! So why do you need me?

Q: Every now and then a trigger has to be pulled.

007: Or not pulled; it’s hard to know which in your pajamas.

from Giphy

In the wake of Russia making inroads in Ukrainian geographical boundaries, the crippling power of cyberattacks would be under a microscopic lens. Is Q ‘wrong’?

Two roads diverged in the woods, posing the question: Where is Cyber Security headed?

Certain protocols and practices important to CyberSecurity will be ferociously debted:

  • How important is Encryption?
  • Should End to End Encryption find a wider use case? Because:

or;

  • Should encryption be weakened?

Wouldn’t war journalists, reporters, and activists favor and support stronger encryption for ease and freedom of communication, protection of identity, and comfortable reporting?

And similarly, wouldn’t governments and enforcement agencies favor weakened encryption, access to communication exchanges for finding and stopping criminal activity?

For the uninitiated, these two polar views are not something new. For several years now, digital privacy proponents and practitioners have talked about the dangers of weakened encryption and constantly worked towards creating more awareness around the issue.

In contrast, many have pushed for encryption to be weakened. In conversations is also a passing of this Act that bans end-to-end encryption.

Which side should have the final say?

Folks over at Proton Technologies posit: There is no such thing as a backdoor that only lets the good guys in.

Wouldn’t E2EE give citizens and day-to-day users digital freedom, peace of mind for secure communications, and a resilient perimeter to unintended damage?

Even further, wouldn’t robust encryption protect Intellectual Property (IP), State secrets, and ward off blackmail threats?

On the flip side, what is the guarantee that backdoor access provides reliable reconnaissance of grave threats? Or exploit vulnerabilities only with the purest intention?

Hard to know which, in my pajamas.

--

--

--

Coffee Addict. Avid Reader and Learner. Business and Digital Marketing conversations in < 5 minutes

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Why Huawei and Chinese Technology Companies Are A Problem

New Design Patent Legislation Would Empower U.S.

Alexagate — Goodbye Overhearing

{UPDATE} Taiteellisen Voimistelun Kuningatar Hack Free Resources Generator

FUD FAQ | A Weekly Community Thread | Week 47

Google Terms of Service and Privacy Policy

​​🤝 S-Wallet values 🤝

Domain Takeover with PetitPotam Exploit

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Abheek

Abheek

Coffee Addict. Avid Reader and Learner. Business and Digital Marketing conversations in < 5 minutes

More from Medium

Automation Isn’t the Savior You Think It Is

Operationalizing MITRE ATT&CK for SOCs | Course notes

Why I switched from Logz.io to Humio

Cyber Insurance in Perspective