{"id":4104030,"date":"2025-12-15T03:14:32","date_gmt":"2025-12-15T08:14:32","guid":{"rendered":"https:\/\/www.computerworld.com\/article\/4104030\/emerging-cyber-threats-how-businesses-can-bolster-their-defenses.html"},"modified":"2025-12-15T03:14:32","modified_gmt":"2025-12-15T08:14:32","slug":"emerging-cyber-threats-how-businesses-can-bolster-their-defenses","status":"publish","type":"post","link":"https:\/\/www.computerworld.com\/article\/4104030\/emerging-cyber-threats-how-businesses-can-bolster-their-defenses.html","title":{"rendered":"Emerging cyber threats: How businesses can bolster their defenses"},"content":{"rendered":"<div id=\"remove_no_follow\">\n\t\t<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n\t\t\t\t\t  <div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n\t\t\t\t\t\t<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\"><div class=\"container\"><\/div><\/section>\n\n\n\n<p>Enterprises leveraging our rapidly digitizing world must also have a robust understanding of how cyber threats are evolving.<\/p>\n\n\n\n<p>AI deepfakes are already becoming too convincing to be easily spotted by common sense approaches. Malicious actors are using AI to find vulnerabilities and to make their attacks harder to detect. And AI systems themselves pose security risks. <a href=\"https:\/\/foundryco.com\/tools-for-marketers\/research-ai-priorities\/\" target=\"_blank\">Research by Foundry<\/a> shows that security and privacy are the most pressing ethical issues around generative AI deployments.<\/p>\n\n\n\n<p>Down the road, quantum computing promises immense power and capabilities for businesses, but it will also be used by adversaries, especially to break encryption.<\/p>\n\n\n\n<p>And further out, technologies still in the labs, such as DNA-based data storage, cybernetics and bio-hacking present their own challenges to security and data protection.<\/p>\n\n\n\n<p>These are just some of the ways future technologies put enterprise security at risk.<\/p>\n\n\n<div class=\"extendedBlock-wrapper block-coreImage undefined\"><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?quality=50&amp;strip=all&amp;w=1024\" alt=\"A collaborative team working during a meeting, analyzing financial data. People are actively discussing charts, showcasing a professional workspace and innovative ideas.\" class=\"wp-image-4104036\" srcset=\"https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?quality=50&amp;strip=all 8256w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=1024%2C576&amp;quality=50&amp;strip=all 1024w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=2048%2C1152&amp;quality=50&amp;strip=all 2048w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=854%2C480&amp;quality=50&amp;strip=all 854w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=640%2C360&amp;quality=50&amp;strip=all 640w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2025\/12\/shutterstock_2618657371.jpg?resize=444%2C250&amp;quality=50&amp;strip=all 444w\" width=\"1024\" height=\"576\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/figure><p class=\"imageCredit\">shutterstock\/Gorgev<\/p><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"over-the-horizon\">Over the horizon<\/h2>\n\n\n\n<p>According to Martin Krumb&ouml;ck, CTO for cybersecurity at T-Systems, security teams can form a clearer view of emerging threats, by dividing them into three timescales, or &ldquo;horizons&rdquo;. &ldquo;There&rsquo;s always something changing in security,&rdquo; he says.<\/p>\n\n\n\n<p>Classical infrastructure security is in the &ldquo;here and now&rdquo;, and an immediate priority. And too many enterprises still have gaps in cloud security and are not yet ready for AI.<\/p>\n\n\n\n<p>&ldquo;We are seeing very quick business adoption of AI,&rdquo; Krumb&ouml;ck explains. &ldquo;At the same time, people are ignoring the risks. But the risks are already here.&rdquo;<\/p>\n\n\n\n<p>Deep fakes, used for CEO and CFO fraud, are one example. &ldquo;In the past, we could mitigate that with good training,&rdquo; Krumb&ouml;ck says. &ldquo;Now, the deep fakes are getting so good that all that training is thrown out of the window.&rdquo;<\/p>\n\n\n\n<p>Other AI threats include attacks on training data for large language models (LLMs), prompt injections and direct attacks on models themselves. &ldquo;But it is not at the forefront of thinking yet,&rdquo; he warns.<\/p>\n\n\n\n<p>CISOs and CSOs, then, need to be aware of the risks of AI. But they need to juggle this with monitoring longer-term threats.<\/p>\n\n\n\n<p>&ldquo;Further over the horizon, there are issues that will become important in security,&rdquo; says Krumb&ouml;ck. &ldquo;The shift to post-quantum cryptography isn&rsquo;t about responding to a threat today, but about preparing for tomorrow. Particularly against long-term risks like &lsquo;harvest-now, decrypt-later&rsquo; attacks.&rdquo; Threats to blockchain technology are another medium-term risk.<\/p>\n\n\n\n<p>It&rsquo;s worth at least being aware of longer term risks posed by emerging disciplines like&nbsp; DNA-based computing technology, where the DNA molecules themselves <a href=\"https:\/\/www.newscientist.com\/article\/2391747-dna-based-computer-can-run-100-billion-different-programs\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform computational processes<\/a>.<\/p>\n\n\n\n<p>&ldquo;DNA storage becomes a huge information security risk because it&rsquo;s so small and can be easily implanted somewhere or used to smuggle data out,&rdquo; says Krumb&ouml;ck. &ldquo;It sounds like sci-fi right now, but it might become a reality.&rdquo;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"back-to-the-future\">Back to the future<\/h2>\n\n\n\n<p>Clearly, security and IT leaders need to plan for emerging threats and inform their boards.<\/p>\n\n\n\n<p>One trusted method is to test new technologies through small trials. This helps understand the organization&rsquo;s risk appetite, alongside the benefits of innovation.<\/p>\n\n\n\n<p>Few enterprises, though, can employ dedicated teams of security researchers and futurists to assess far-off risks. But organizations can work with their security partners, leverage their expertise and scale to look over the horizon.<\/p>\n\n\n\n<p>As one of the largest enterprises in its sector, Deutsche Telekom and T-Systems have that scale. &ldquo;That, in itself, puts a huge target on our backs, and we need to defend our own telecommunications network day in day out, and protect our end customers,&rdquo; Krumb&ouml;ck explains.<\/p>\n\n\n\n<p>This allows <a href=\"https:\/\/www.t-systems.com\/gb\/en\/security\" target=\"_blank\" rel=\"noreferrer noopener\">T-Systems<\/a> to invest forward-looking security research, and crucially, translate that intelligence into information and advice that boards can understand, and act on.<\/p>\n\n\n\n<p><strong>Want to secure AI initiatives? Start with this <\/strong><a href=\"https:\/\/www.t-systems.com\/de\/en\/security\/gated-content\/cyber-security-for-ai-agents\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>e-book<\/strong><\/a>.<\/p>\n\n\n\n<p><strong>Need to rethink comprehensive security? Check out this <\/strong><a href=\"https:\/\/www.t-systems.com\/de\/en\/security\/gated-content\/comprehensive-security-for-enterprises\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>guide<\/strong><\/a>.<\/p>\n<\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Enterprises leveraging our rapidly digitizing world must also have a robust understanding of how cyber threats are evolving. AI deepfakes are already becoming too convincing to be easily spotted by common sense approaches. Malicious actors are using AI to find vulnerabilities and to make their attacks harder to detect. And AI systems themselves pose security [&hellip;]<\/p>\n","protected":false},"author":3468,"featured_media":100070956,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"__idg_published_ids":[],"__idg_published_status":"draft","embargo_date":"","multi_title":"{\"titles\":{\"headline\":{\"value\":\"Emerging cyber threats: How businesses can bolster their defenses\",\"additional\":{\"short_title\":\"Emerging cyber threats: How businesses can bolster their defenses\",\"headline_subheadline\":\"AI risks must be addressed quickly as businesses transform. \",\"headline_desc\":\"AI risks must be addressed quickly as businesses transform. \"}},\"seo\":{\"value\":\"Emerging cyber threats: How businesses can bolster their defenses\",\"additional\":{\"seo_desc\":\"AI risks must be addressed quickly as businesses transform. \"}},\"social\":{\"value\":\"Emerging cyber threats: How businesses can bolster their defenses\",\"additional\":{\"social_desc\":\"AI risks must be addressed quickly as businesses transform. \"}}},\"subtitles\":[]}","old_id_in_onecms":"","_idg_updated_flag":false,"_idg_updated_date":"","hreflang_xdefault":0,"content_type":"BrandPost","suppress_html_meta":"{}","byline":"","featured_video_id":0,"supress_floating_video":false,"prevent_index":0,"has_duration":0,"teaser_paragraphs":"","is_translated_post":0,"idg_original_post_id":0,"idg_translated_post_ids":[],"idg_original_post_publication":"","idg_original_post_language":"","idg_original_post_brand":"","reviews":null,"suppress_monetization":"{\"content_ads\":true,\"jwplayer\":true,\"nativo\":true,\"outbrain\":true,\"answer-disable\":true,\"explore-disable\":true}","is_premium":0,"external_post_link":"","suppress_fake_sidebar":"{}","first_published_date":"2025-12-10T13:27:42+01:00","hide_featured_image_for_post":true,"post_featured_image_nocaption":true,"post_featured_image_caption":"","automatic_content_time":4,"manual_content_time":0,"most_popular_author":null,"more_from_author":null,"footnotes":null},"categories":[1885,2486],"tags":[],"languages":[21],"editions":[12],"publication":[9,10],"territory":[],"story_types":[33],"article_type":[7396],"sponsorships":[25171],"blogs":[],"podcast_series":[],"origin":[7179],"coauthors":[8530],"class_list":{"0":"post-4104030","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"category-security","9":"languages-en","10":"editions-global","11":"publication-computerworld","12":"publication-us-default","13":"story_types-brandpost","14":"article_type-brandpost","15":"sponsorships-rethinking-security-in-a-digitized-world","16":"origin-wp"},"jetpack_featured_media_url":"https:\/\/www.computerworld.com\/wp-content\/uploads\/2025\/12\/4104030-0-03893500-1765786515-shutterstock_2618657371.jpg?quality=50&strip=all","eyebrow":{"eyebrow":"brandpost","eyebrow_style":"default","eyebrow_feed_title":"brandpost","eyebrow_feed_style":"default"},"review_score":null,"article_type_name":["brandpost"],"author_name":"Damaris D\u00f6ttling","author_meta":[{"authorID":3468,"name":"Damaris D\u00f6ttling","url":"https:\/\/www.computerworld.com\/profile\/damaris-dottling\/","img":"","defaultUrl":"https:\/\/secure.gravatar.com\/avatar\/c419717b8c1ab46456062e08e930433bb57cf5a6fbb6f83da53f4570d98a4874?s=96&d=mm&r=g","profileImage":null,"job_title":""}],"multiple_name":"Damaris D\u00f6ttling","_embedded":"Damaris D\u00f6ttling","_links":{"self":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/posts\/4104030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/users\/3468"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/comments?post=4104030"}],"version-history":[{"count":0,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/posts\/4104030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/media\/100070956"}],"wp:attachment":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/media?parent=4104030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/categories?post=4104030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/tags?post=4104030"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/languages?post=4104030"},{"taxonomy":"editions","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/editions?post=4104030"},{"taxonomy":"publication","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/publication?post=4104030"},{"taxonomy":"territory","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/territory?post=4104030"},{"taxonomy":"story_types","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/story_types?post=4104030"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/article_type?post=4104030"},{"taxonomy":"sponsorships","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/sponsorships?post=4104030"},{"taxonomy":"blogs","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/blogs?post=4104030"},{"taxonomy":"podcast_series","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/podcast_series?post=4104030"},{"taxonomy":"origin","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/origin?post=4104030"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/coauthors?post=4104030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}