Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementLogical Security

6 trends driving hardware cybersecurity innovation

By Simon Johnson, Asmae Mhassni
cyber security

Image from Pixabay

September 12, 2022

Spending on cybersecurity is expected to reach $458.9 billion by 2025 — an increase of more than $196 billion compared to 2021. As this growth progresses, the entire cyber ecosystem is being shaped and impacted by a variety of factors including environmental forces, technology inflection points, and security trends.

As the industry moves forward, it’s important to understand what key trends are impacting hardware security innovation so all involved can more strategically evaluate technology, resources and planning. First, a couple of caveats — it’s important to keep in mind that security trends can often be a reaction to what’s going on in the security ecosystem itself, rather than specifically something that gets created. Also, regulation is traditionally a precursor to creating a security trend. With that in mind, let’s dive in.

Environmental forces (such as political, economic, societal, technological, etc.) are increasingly cascading across the security landscape. Today, there are more devices, more data, more breaches, and even more regulation in the threat landscape. The publicity of attacks is driving increased anxiety for consumers, governments and companies. Compounding the issue is the fact that the ransomware industry is thriving. Once created uniquely by individual hackers, ransomware has now morphed to include Ransomware as a Service (RaaS) and enterprise-like cybercrime rings, resulting in singular solutions that can be leveraged en masse — and they’re generating hundreds of millions of dollars in ransoms.

Supply chain attacks are also now fair game for threat actors. Nation-states are increasingly attacking supply chains and using those attacks to serve a dual purpose — generating money and demonstrating weakness in Western systems. An additional target of cyberattackers is user data — the rise in number and size of data breaches has highlighted how much personal data is monetized. The industry is working to strike a balance between technologies that improve people’s lives versus empowering bad actors to invade privacy.

While environment factors impact hardware security, there are also a variety of infection points and security trends influencing the hardware security space. Let’s look at six (and keep in mind, this list is not exhaustive):

  1. The drive to the edge: The creation of 5G networks and the need for lower latency is pushing the boundaries of where computation is going to take place. Edge devices run many threads across many microservices. As a result, workloads are no longer monolithic, and data is being processed through an array of devices. To secure the weakest link, data needs to be protected at every step. But as these devices make their way to a growing number of physically insecure locations, those challenges are increasing dramatically.
  2. AI everywhere and data is becoming king: Artificial intelligence (AI) is becoming a predominant part of computing applications. While it will bring new use cases and insights, it also brings added challenges in privacy and security. It will require massive data quantities to operate efficiently and competitively, which means continued investment in acquiring, classifying, storing and monetizing data. Furthermore, data access, privacy, ownership and control are all areas of increasing competition and conflict.
  3. Quantum computing on the horizon: Having spent years in academic research, the quantum era is looking increasingly like it will be a reality within the next decade. The frightening consequence, at least from a security perspective, is the implications this could have on the foundations of cryptography (and the ability to solve incredibly difficult mathematical problems upon which it is built).
  4. Confidential computing as the next frontier in data security: Confidential computing has emerged as a way for infrastructure service providers to re-establish trust with tenants so third-party data is not visible. Achieving this at scale and across the variety of devices being introduced is a significant challenge. At the same time, the cost to the user of doing this in terms of performance and complexity still needs to be minimized before it can be adopted broadly (which Everest Research predicts could come as soon as 2026). However, advances in this space are being made across the industry.
  5. Evolving roots of trust: Users face a challenge of achieving confidence in a system built from a diverse set of silicon components and providers. Consistent protections are now expected from all CPUs, GPUs, sensors, FPGAs, etc. The industry and users are moving away from large and complex roots of trust and planning solutions across segments. Standardization, transparency and interoperability of security strategies and methods are key to addressing this end-to-end security.
  6. Overall trustworthy systems: While there has been a recent trend of hardware attacks, hardware and software can’t be separated. Trustworthiness is a system problem across the data, processor and platform components (of the entire lifecycle). This has a broad impact from making devices secure by default (a challenge with Internet of Things [IoT] devices, for example); improving supply chain practices; giving users more transparency and visibility into security functions, and more.

Over the last decade, innovation in the hardware security space has evolved dramatically — from a focus on applications and software to increased protections rooted deep in silicon. As threats have moved down the stack, hardware research and innovation has increased across the industry and with academia. This has also increased collaboration between organizations as they work to solve security issues together.

KEYWORDS: 5G cyber security data protection hardware breach quantum computing ransomware Security trends

Share This Story

Simon Johnson is Senior Principal Engineer at Intel.

Asmae Mhassni is Principal Engineer at Intel.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing