Drei Experten von GTT geben einen Überblick über die aus ihrer Sicht wichtigsten Prognosen für die Cybersicherheit im Jahr 2025. | Three GTT experts provide an overview of what they see as the most important predictions for cybersecurity in 2025. |
Generative KI-Systeme haben 2024 einen Boom erlebt – bei der Erkennung von Bedrohungen und der Automatisierung von Sicherheitsprozessen, gleichzeitig aber auch bei der Nutzung durch Cyberkriminelle, etwa bei Phishing-Kampagnen und Social Engineering. Darüber hinaus hat der Vormarsch des Internets der Dinge (Internet of Things, IoT) die Angriffsfläche vergrößert, und geopolitische Spannungen haben zu einer Zunahme staatlich gesponserter Cyberangriffe geführt. Die Unternehmen befinden sich in einem regelrechten Wettlauf zwischen immer raffinierteren Angriffsmethoden und der Notwendigkeit, ihre Abwehrmechanismen ständig zu modernisieren.
Erik Nordquist, Global Managed Security Product Director bei GTT
Dave Fraser, VP of Security bei GTT
Darren Wolner, VP, Product Management – Managed and Professional Services bei GTT
|
Generative AI systems boomed in 2024 – in threat detection and security process automation, but also in their use by cybercriminals in phishing campaigns and social engineering. In addition, the rise of the Internet of Things (IoT) has expanded the attack surface, and geopolitical tensions have led to an increase in state-sponsored cyberattacks. Organizations are in a race between increasingly sophisticated attack methods and the need to constantly modernize their defenses.
Erik Nordquist, Global Managed Security Product Director, GTT
Organizations will still be hacked in 2025. More worryingly, they won’t know when it happens. The longer an attacker remains undetected in the system, the more costly and serious these „silent breaches“ become. Cybercriminals operate in the shadows for weeks, months, or even a year. They are like an unwanted guest who overstays his welcome and never leaves – except that the attackers steal computer resources, exfiltrate data, find deep network vulnerabilities, and even install backdoors for future access.
In 2025, organizations will increasingly shift their network security spending to incident response and detection. Once used primarily by large enterprises, organizations of all sizes will now create response plans and engage third-party vendors. As threats become more sophisticated, organizations will invest in solutions that quickly detect and mitigate breaches. While endpoint and firewall protection will remain critical, budgets will increasingly be allocated to rapid detection and response, representing a shift away from prevention alone.
So-called deep phishing attacks – AI-powered campaigns that combine spear phishing with deepfake technology – will increase in 2025. Unlike traditional phishing or spear-phishing attacks, deep phishing uses synthetic media to create near-perfect replicas of trusted individuals, such as executives or colleagues, who create a false sense of security through personalized audio or video messages. This AI-powered approach makes it nearly impossible for victims to detect malicious intent, increasing the number of successful attacks. At the same time, it is clear that advanced detection methods are needed to defend against these attacks and to train employees to recognize them. Dave Fraser, VP of Security at GTT
In 2025, instead of trying to prevent every breach, organizations will focus on rapid threat detection and response. As threats become more complex and unavoidable, the need for multi-layered protection that can respond quickly and effectively to incidents will become more urgent. As a result, organizations will expect their teams and vendors to act quickly – with processes that assume a successful attack is a matter of when, not if.
In 2025, service providers will have to take more responsibility for proper cyber hygiene due to stricter regulations in the EU, US and UK. New regulations, such as the EU’s NIS2 directive and the FCC’s requirements in the US, will raise cybersecurity standards – especially in the telecoms industry and critical infrastructure. As governments push for stronger network security, providers must quickly adapt to these national and international regulations to avoid potential penalties.
Remote work continues to drive Zero Trust adoption as organizations build on existing VPNs, endpoint protection, and centralized logging capabilities already in place for hybrid setups. This foundation simplifies Zero Trust implementation and enables seamless, unified security and monitoring across the home and office. Darren Wolner, VP, Product Management – Managed and Professional Services at GTT
Data-driven and AI-powered automation will serve as the first line of defense in 2025 as the number of cyber threats increases while the attack surface for networks expands – for example, with the growing reliance on hybrid workforces, the IoT, and cloud services. Defense systems must act in real time and autonomously, analyzing data patterns to counter threats without human intervention. By learning from each new incident and evolving in real time, they enable networks to be adaptive. This allows organizations to respond to emerging threats faster, smarter, and more accurately.
Even in 2025, many organizations will still be in a transitional phase of digital transformation. As a result, the demand for secure, flexible network solutions such as SASE and SD-WAN will continue to grow. Digital transformation and increasing cyber threats will continue to drive this change, but widespread adoption will require resources and time. API (application programming interface) automation and AI-powered solutions will play an important role in improving network resilience and pave the way for more autonomous, adaptive defenses.
The growing demand for generative AI and AI-driven workflows will force organizations in 2025 to scale their networks to handle the massive amounts of data with minimal latency. They will rely on edge computing and distributed architectures to increase network performance for hybrid work and cloud environments. In addition to driving the need for more powerful networks, AI is also helping operators optimize network performance. With AI-based monitoring and adaptive optimization, networks become smarter and more efficient – and can meet the demanding requirements of modern AI applications. |
Dr. Jakob Jung ist Chefredakteur Security Storage und Channel Germany. Er ist seit mehr als 20 Jahren im IT-Journalismus tätig. Zu seinen beruflichen Stationen gehören Computer Reseller News, Heise Resale, Informationweek, Techtarget (Storage und Datacenter) sowie ChannelBiz. Darüber hinaus ist er für zahlreiche IT-Publikationen freiberuflich tätig, darunter Computerwoche, Channelpartner, IT-Business, Storage-Insider und ZDnet. Seine Themenschwerpunkte sind Channel, Storage, Security, Datacenter, ERP und CRM.
Dr. Jakob Jung is Editor-in-Chief of Security Storage and Channel Germany. He has been working in IT journalism for more than 20 years. His career includes Computer Reseller News, Heise Resale, Informationweek, Techtarget (storage and data center) and ChannelBiz. He also freelances for numerous IT publications, including Computerwoche, Channelpartner, IT-Business, Storage-Insider and ZDnet. His main topics are channel, storage, security, data center, ERP and CRM.
Kontakt – Contact via Mail: jakob.jung@security-storage-und-channel-germany.de