In this article, I will share with you the relationship between Emerging Technology & Disruptive Technology concepts and cyber security. Let’s start by trying to understand what these two concepts are.

Emerging technology is a term commonly used to explain a brand-new technology; however, it can additionally refer to the continuing development of an existing technology; the time period normally refers to technology which are presently developing, or which are expected to be available in the subsequent 5 to 10 years, and is typically reserved for technology which are creating, or are expected to create, significant social or monetary effects.

Disruptive technology is an innovation that considerably alters the manner that consumers, industries, or companies operate. A disruptive technology sweeps away the systems or conduct it replaces as it has attributes which might be recognizably superior.

Let’s examine what are these emerging and/or disruptive technologies that can have an impact on Cybersecurity, respectively. What is the effect of emerging and disruptive technology on cybersecurity? How can those technology useful resource us and shield us? At the same time, what vulnerabilities carry they present? What kind of new tools and advantage do they offer to hackers? All the new emerging and disruptive technology carry accelerated competencies to useful resource the businesses, however present some additionally challenges from a safety perspective. Security technologists constantly discover a manner to both remediate the vulnerabilities or put in force mitigating controls to decrease or switch the risk. Let’s try to analyze the answers to these questions in detail.

1. Zero Trust with micro-segmentation: Zero Trust is a protection structure and implementation paradigm that reduces enterprise threat through appearing secure implementations in compliance with the main that everyone assets outside and inside a perimeter firewall aren’t to be depended on and accordingly get entry to control for users, devices, systems and services need to be supplied the usage of least privilege. These implementations do have the tendency to result in extra infrastructural and application complexity, and expanded costs.

2. IOT (Internet of Things): IOT (internet of things) has created an automated, cost powerful manner to permit real-time intercommunication among users and devices amongst many different things and has helped offer get entry to information that allows more than one business and consumer friendly use cases. On the turn side, IOT additionally affords many data protection and privacy issues such as Network segmentation (by setting the IOT devices on a segmented network), Network Access Control (by doing tool primarily based totally authentication and the usage of 802.1X authentication), by disabling Bluetooth and blockading their functionality to connect with unauthorized wi-fi networks, Auto detecting and inventorying all IOT devices inside CMDB, making sure that IOT devices are patched for vulnerabilities much like other computing devices, and making sure that they use strong (expertise and token primarily based totally) authentication paradigms.

3. Robotic Process Automation: Robotic Process Automation (RPA or RPA bots) is designed to perform certain high-volume, manual and repeatable tasks performed by those working in the IT industry (for example call center agents and back-office staff). Over the last five to seven years, major industry players have brought about a significant improvement in the capabilities of these RPA bots with investment in this technology area. There are two types of RPA bots currently prevalent in the industry, joined and unattended bots. This technology adds value to the IT industry by improving productivity, efficiency, agility and customer service. However, as new risks arise with the adoption of other disruptive and emerging technologies, more rigorous analysis, identification, remediation and mitigation of RPA-related security risks are required.

4. Blockchain: While it is a well-documented reality that blockchain has created a new ecosystem for decentralized money transfer and crypto-currency transactions and has discovered large use in deliver chain management, accounting, smart contracts, voting, stock exchange, insurance, shipping and peer-to-peer worldwide transactions, it has additionally been plagued with the aid of using numerous security issues like the “Penny-Flooding Attack”, “Penny-Spend attack”, “51% Attack”, “Sybil Attack”, “Transaction flooding”, “Silkroad attack”, “Eclipse attack”, “Steganographic attack” and “Time-jacking attack”. Security technologists round the world have collaborated to discover many remediations, patches and mitigation strategies to keep this blockchain ecosystem secure for use, however non-stop evaluation needs to be completed to make sure that each one new vulnerability are proactively patched.

5. Artificial Intelligence and Machine Learning: The adoption of Artificial Intelligence and Machine Learning has the ability to revolutionize each industry (manufacturing, medical, software, service, finance, banking, etc.), and via developments along with the Internet of Things (IOT), nearly each element of lifestyles as we realize it today. Machine Learning and supervised AI are presently as good as the training datasets and as a result suffer from false positives from a security perspective. Also, unsupervised AI, if left unmanaged or without a code of ethics, runs the risk of evolutionary computation caused float and the potential lack of algorithmic transparency and accountability.

6. Hyperconverged storage and compute: Hyperconverged storage and compute provide diverse benefits of higher scalability and theoretical simplicity however suffer from the risks of excessive-electricity consumption because of excessive equipment density, higher and/or unmanaged licensing costs and shortage of compatibility with different cloud and/or on-premises infrastructures. Hyperconverged infrastructure (HCI) may additionally conflict with the security concepts of Zero trust unless built into the HCI.

7. Digital Me and Identity: Digital Me provides the ability to create a digital (or twin) representation that can be used to represent an individual in both the physical and digital space. With the pandemic, he has further highlighted this by enabling the creation of digital personas for people to securely share their health profiles or enable social distancing without compromising their ability to engage in meaningful dialogue. This technology is moving beyond text and images to fully formatted voice-activated holographic images that can represent an individual using a digital twin, or even your digital copy in the Metaverse ecosystem. This technology needs to be properly secured due to fears that someone’s digital twin/identity will be stolen and then used to impersonate someone for financial gain or other malicious activity.

8. Memory-Driven Computing: Memory-Driven Computing sets itself apart by giving every processor in a system access to a huge pool of shared memory; this differs sharply from today’s systems, where a relatively small amount of memory is attached to each processor. While this can bring tremendous performance optimizations, it certainly raises data security and privacy concerns.

9. Quantum computing and Cryptography: Quantum computing applies the principles of quantum mechanics to computers. This makes a quantum computer, very fast, very powerful and can cause an exponential increase in computing power. Post-quantum computing era, all the encryption algorithms that are based on computational difficulty will fail, and only quantum encryption schemes may be the lone ones left standing, raising many data security and preservation of data confidentiality concerns in the other encryption algorithm. Quantum Cryptography offers a secure solution to the issue of secure key exchange that may plague symmetrical and asymmetrical cryptosystems. It provides some enhanced capability to detect man-in-the-middle (MITM) attacks. It also limits exposure to certain weaknesses that may exist in conventional cryptosystems because of its ability to restrict the capability to copy data encoded in a quantum state.