Cybersecurity is rapidly moving from an afterthought once your digital product offering grows, to a necessity for any firm that employs technology anywhere in its work process. Today, this means virtually every firm needs it, and needs to do it well, 24/7, and needs mitigation strategies when it fails.
In the future, cybersecurity will be significantly more complex, in fact, it is not at all clear how it will even be possible to protect a technology once the quantum barrier is breached.
The topic is perhaps one of the most misunderstood technology topics there are. Why? Because of its sheer complexity, the way it ebbs and flows in a constant battle with those who seek to exploit vulnerabilities.
It is, therefore, virtually impossible to be ahead of the curve in cybersecurity. Those who claim to be are all vendors. Everybody else is on the back wheel, including academics, most of the time, given the real-time nature of the game. Many technologies are moving at similar breakneck speed. In fact, based on our analysis and ongoing monitoring, we believe there are 25 top Meta-technologies shaping the world of tomorrow. See more on the 24 others in another blogpost or log onto Yegii and check out our online taxonomy tool to track the evolution of tech (note that it requires free login).
Meta technologies shaping the world of tomorrow
Yegii’s taxonomy is a visual display of the most important keywords and document tags used across Yegii’s content, e.g. startups, publishers, events, reports, disruption topics, news, etc. Specifically, our man/machine system has come up with 25 meta-technologies, such as AI, Synthetic Biology, Internet of Things, Neuroscience, Quantum Computing and Nanotechnology, which will shape the world in a plethora of ways we are only starting to imagine. We will explore each of these in separate posts and they also each have a site on Yegii’s disruption tracker (still in beta but coming soon to a computer near you).
Even keeping up with cybersecurity terms is a full-time job. To demonstrate this, I’ve selected just five terms and will attempt to briefly explain them.
- False positives
- Security framework
- Autonomous threat response
- AI optimized cyber attack strategies
An online cyber taxonomy
Instead of attempting to recreate a lexicon of cybersecurity, what we’ve tried to do at Yegii, is to produce an ever-evolving online taxonomy of terms which all are related to each other and displayed in visual format using a visualization library called D3 as well as Yegii’s tech insight network data.
As you may see from Figure 1.1 below, Cyber taxonomies can be complex. Each term in the visualization below belongs to a cluster of terms that, in turn, are connected to each other. We shall dive into a few of them, but this material is best explored online (feel free to do so).
Only a few disruption experts have any capacity to track more than a few of these topics in some depth at any given time, which is why Yegii’s man/machine system is groundbreaking. Support for custom taxonomies personalized to you and your team’s needs is available through an Enterprise subscription.
Even just listing the outer layer of the taxonomy brings us to 61 primary connections, which is far too much to describe in a blog post or article.
Cybersecurity professionals are near impossible to come by. For that reason, Yegii has created a set of tools to remedy the situation. One of them is our event guide (see Y Events), where you can find the top 1000 tech conferences across the globe, among them a small subset of cybersecurity conferences that you either must attend or use our tool to track speakers, topic or trends derived from them. This tool is still under rapid development and any input from experts would be great–so thanks beforehand.
Figure 1.3. outlines System-level cybersecurity attacks. As you can see, the sheer number of types of such attacks is bewildering at this stage, and growing exponentially year on year.
Lastly, the cybersecurity threat typology is so vast that any course will only scratch the surface. In fact, the domain is rapidly becoming so complex that each of these become very specialized pursuits. We are moving into an era where machines have to structure our discussion around cybersecurity because we are hitting the human limit of memory and capacity for interconnection and meaningful communication.
All of this, of course, favors the prepared man/machine setup, which is likely why most successful cyber attacks these days are automated, if not in conception, at least in execution.