Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Securing Tomorrow’s Digital World: Key Trends in Cyber security for 2024

Version 1 : Received: 5 September 2024 / Approved: 6 September 2024 / Online: 9 September 2024 (11:39:05 CEST)

How to cite: Biplob, M. B.; Marma, S. M.; Akther, M. Securing Tomorrow’s Digital World: Key Trends in Cyber security for 2024. Preprints 2024, 2024090576. https://doi.org/10.20944/preprints202409.0576.v1 Biplob, M. B.; Marma, S. M.; Akther, M. Securing Tomorrow’s Digital World: Key Trends in Cyber security for 2024. Preprints 2024, 2024090576. https://doi.org/10.20944/preprints202409.0576.v1

Abstract

It is critical to keep abreast of emerging dangers in the constantly changing field of cyber security. As 2024 approaches, numerous technological developments and trends are changing how businesses handle cyber security. This article explores the cutting edge of cyber security developments that are expected to rule in 2024. The field of cyber security is undergoing a revolution, from the adoption of Zero Trust Architecture (ZTA) as the new paradigm to the integration of AI and ML for real-time threat detection. Solutions for Extended Detection and Response (XDR) are becoming the mainstay for thorough threat detection and response in a variety of contexts, including networks, endpoints, and cloud environments. The use of biometric authentication techniques is growing in popularity because they provide better access control and identity verification. Concurrently, Deception Technologies are altering defensive tactics by using fictitious assets to trick and identify attackers at an early stage. Quantum-resistant cryptography, which aims to protect sensitive data from future quantum attacks, is on the horizon given the threat posed by quantum computing. Furthermore, the growing number of linked devices emphasizes how critical it is to strengthen IoT security protocols. Moreover, as long as companies are using cloud computing, they must make sure that strong cloud security protocols are in place. Simultaneously, the emergence of containerization technologies demands a targeted strategy for containerized environment security. Organizations must adopt these practices and strengthen their defenses against new threats as the cyber security landscape changes. Businesses may confidently and resiliently traverse the complex cybersecurity landscape of 2024 by remaining aware and implementing proactive security measures.

Keywords

threat detection; cybersecurity frameworks; behavioral biometrics; risk mitigation; cyber resilience; artificial intelligence; machine learning

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.