{"id":26177,"date":"2023-01-05T19:36:21","date_gmt":"2023-01-05T19:36:21","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=26177"},"modified":"2023-01-06T18:53:12","modified_gmt":"2023-01-06T18:53:12","slug":"cybersecurity-predictions-2023","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/","title":{"rendered":"Security Outlook 2023: Cyber Warfare Expands Threats"},"content":{"rendered":"\n<p>After a year that saw massive ransomware attacks and open cyber warfare, the biggest question in cybersecurity for 2023 will likely be how much of those attack techniques get commoditized and weaponized.<\/p>\n\n\n\n<p>&#8220;In 2022, governments fought wars online, businesses were affected by multiple ransomware gangs, and regular users&#8217; data was constantly on hackers&#8217; radars,&#8221; said NordVPN CTO Marijus Briedis.<\/p>\n\n\n\n<p>2023, he predicted, &#8220;will not be any easier when it comes to keeping users\u2019 data safe and private.&#8221;<\/p>\n\n\n\n<p>Here, then, are the threats, targets and attack vectors likely to be popular with cyber criminals in the next year \u2014 along with the ways that cyber defenses are evolving to thwart those threats.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d700bda27cd\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d700bda27cd\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#Wiper-Malware-Critical-Infrastructure-Threats-Unleashed-by-War\" title=\"Wiper Malware, Critical Infrastructure Threats Unleashed by War\">Wiper Malware, Critical Infrastructure Threats Unleashed by War<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#RaaS-and-CaaS-Continue-to-Grow\" title=\"RaaS and CaaS Continue to Grow\">RaaS and CaaS Continue to Grow<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#Supply-Chain-Attacks-Dependencies-Remain-Issues\" title=\"Supply Chain Attacks, Dependencies Remain Issues\">Supply Chain Attacks, Dependencies Remain Issues<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#Security-Products-Face-Greater-Scrutiny\" title=\"Security Products Face Greater Scrutiny\">Security Products Face Greater Scrutiny<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#End-Users-Are-Still-the-Trouble-Spot\" title=\"End Users Are Still the Trouble Spot\">End Users Are Still the Trouble Spot<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#Automation-and-Services-Grow-in-Importance\" title=\"Automation and Services Grow in Importance\">Automation and Services Grow in Importance<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#More-Companies-Ditching-Cookies\" title=\"More Companies Ditching Cookies\">More Companies Ditching Cookies<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#More-Metaverse-Means-More-Hacking\" title=\"More Metaverse Means More Hacking\">More Metaverse Means More Hacking<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#More-Regulatory-Scrutiny\" title=\"More Regulatory Scrutiny\">More Regulatory Scrutiny<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#Finally-Some-Hope\" title=\"Finally, Some Hope\">Finally, Some Hope<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Wiper-Malware-Critical-Infrastructure-Threats-Unleashed-by-War\"><\/span>Wiper Malware, Critical Infrastructure Threats Unleashed by War<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Russia&#8217;s invasion of Ukraine unleashed a concurrent cyberwar, with wiper malware and threats to critical infrastructure just two of the consequences that have spread to other nations.<\/p>\n\n\n\n<p>Wiper malware was considered an old and time-worn attack method until it made a comeback in 2022, as attackers introduced new variants. It&#8217;s now back with a vengeance, and 2023 should see it begin to appear in more headlines.<\/p>\n\n\n\n<p>The increase in data-wiping malware was seen in the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cisa-microsoft-warn-of-wiper-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">buildup to the war in Ukraine<\/a>, but has since spread into dozens of additional countries, not just in Europe.<\/p>\n\n\n\n<p>There&#8217;s even been growing evidence that <a href=\"https:\/\/www.esecurityplanet.com\/threats\/azov-ransomware-wipes-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">data destruction could replace ransomware<\/a>, as ransomware groups seek leverage to force victims to pay.<\/p>\n\n\n\n<p>The new year will also likely bring an increase in catastrophic attacks on critical infrastructure, resulting in a major outage of some kind. The ongoing\u00a0war in the Ukraine has led to more nation-state sponsored attacks that tend to have societal and economic impacts. Because of the urgency of the threat, the Biden Administration plans to regulate the cybersecurity of critical infrastructure, according to a new <em>Washington Post<\/em> <a href=\"https:\/\/www.washingtonpost.com\/national-security\/2023\/01\/05\/biden-cyber-strategy-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">report<\/a>.<\/p>\n\n\n\n<p>There may also be digital civil disobedience&nbsp;cropping up in 2023, as people attack their own government sites or national infrastructure as a form of protest against rising inflation or political turmoil. The U.S., for example, has recently seen a spate of attacks on power substations; capabilities unleashed by the war in Ukraine create the potential for much worse.<\/p>\n\n\n\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-security-steps-russia\/\" target=\"_blank\" rel=\"noreferrer noopener\">SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"RaaS-and-CaaS-Continue-to-Grow\"><\/span>RaaS and CaaS Continue to Grow<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Beyond threat actors combining a computer worm with wiper malware and ransomware for maximum impact, there is growing concern about the possible commoditization of wiper malware for cyber criminals due to the maturation of Cybercrime as a Service (CaaS).<\/p>\n\n\n\n<p>It becomes increasingly likely that malware developed by nation-state actors could be picked up and reused by criminal groups and spread through the CaaS model. Given its broader availability combined with the right exploit, wiper malware could cause massive destruction in a short period of time, said Derek Manky, chief security strategist and VP of global threat intelligence at FortiGuard Labs.<\/p>\n\n\n\n<p>2022 was notable for the spread of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware as a service (RaaS)<\/a>. Cyber gangs evolved their supply chains to the point where RaaS kits could allow those lacking technical skills to hold enterprises to ransom. The RaaS developers gain a cut of any successful heists.<\/p>\n\n\n\n<p>That success has given rise to additional attack vectors being made available as a service through the Dark Web to fuel a significant expansion of cybercrime as a service. Seasoned cyber criminals can create and sell attack portfolios as a service to receive simple, quick, and repeatable paydays.<\/p>\n\n\n\n<p>The LockBit threat group is the biggest source of ransomware and RaaS attacks, accounting for 44% of successful ransomware attacks in 2022, according to Trustwave SpiderLabs in a new report released today. Black Basta \u2014 with alleged connections to Conti, REvil and Fin7 \u2014 and Hive were the next most active ransomware groups. Whatever form they take, expect them to continue to make headlines in 2023.<\/p>\n\n\n\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware Protection: How to Prevent Ransomware Attacks<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Reconnaissance and Laundering as a Service Emerge as Threats<\/strong><\/h3>\n\n\n\n<p>Expect subscription-based CaaS offerings and reconnaissance as a service offerings. As attacks become more targeted, threat actors will likely hire &#8220;detectives&#8221; on the Dark Web to gather intelligence on a particular target before launching an attack, said Manky.<\/p>\n\n\n\n<p>Like insight from a private investigator, reconnaissance as a service can serve up attack blueprints to include an organization&#8217;s security schema, key cybersecurity personnel, the number of servers, known external vulnerabilities, and even compromised credentials for sale to help a cyber criminal carry out a highly targeted and effective attack.<\/p>\n\n\n\n<p>Another new attack service, laundering as a service (LaaS), enables cyber criminals using machine learning (ML) to identify potential money mules to launder cash, reducing the time it takes to find recruits. This includes the deployment of automation to move money through layers of crypto exchanges, making the process faster and more challenging to trace.<\/p>\n\n\n\n<p>\u201cAs cybercrime converges with advanced persistent threat methods (<a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">APTs<\/a>), cyber criminals are finding ways to weaponize new technologies at scale to enable more disruption and destruction,\u201d said Manky. \u201cThey are not just targeting the traditional attack surface but also beneath it, meaning both outside and inside traditional network environments.<\/p>\n\n\n\n<p>\u201cAt the same time, they are spending more time on&nbsp;reconnaissance to attempt to evade detection, intelligence, and controls,&#8221; he added. &#8220;All of this means cyber risk continues to escalate and that CISOs need to be just as nimble and methodical as the adversary.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Supply-Chain-Attacks-Dependencies-Remain-Issues\"><\/span>Supply Chain Attacks, Dependencies Remain Issues<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Software supply chain issues like the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/guarding-against-solorigate-ttps-solarwinds-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds attack<\/a> and the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4j vulnerability<\/a> have made <a href=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">supply chain security and software dependencies<\/a> major issues in recent years. Expect the tangled combination of proprietary and open source software to remain a major threat in 2023 \u2014 with the hopeful note that we may see effective security solutions begin to emerge.<\/p>\n\n\n\n<p>DigiCert predicts that 2023 will be &#8220;the Year of the SBOM,&#8221; as the <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/sbom\/\" target=\"_blank\" rel=\"noreferrer noopener\">software bill of materials<\/a> framework moves from a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cisa-fbi-colonial-pipeline-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">federal requirement<\/a> to the commercial market. By listing every software component and library that went into building an application, as well as services, dependencies, compositions and extensions, SBOMs provide critical visibility that will speed their adoption, DigiCert <a href=\"https:\/\/www.digicert.com\/blog\/digicert-2023-security-predictions\" target=\"_blank\" rel=\"noreferrer noopener\">predicted<\/a>.<\/p>\n\n\n\n<p>&#8220;Because of the information and visibility it provides into software supply chains, we predict the SBOM will be widely adopted in 2023,&#8221; the digital security company said. &#8220;While most of the requirements are taking place at the federal level now, expect the SBOM to spread to commercial markets soon.&#8221;<\/p>\n\n\n\n<p>Aqua Security, Endor Labs and Tanium are others positioning themselves to help clients detangle the application dependency mess to meet software supply chain security attestation, SBOM and Executive Order 14028 requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Security-Products-Face-Greater-Scrutiny\"><\/span>Security Products Face Greater Scrutiny<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Software and applications won&#8217;t be the only thing facing greater scrutiny this year. Economic headwinds and tighter IT budgets will mean that security products will get a much more rigorous evaluation by potential buyers.<\/p>\n\n\n\n<p>Security buyers have long faced a <a href=\"https:\/\/www.esecurityplanet.com\/trends\/security-buyers-struggle-to-evaluate-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">lack of information<\/a> on how well security products actually work, but Illumio CTO PJ Kirner predicts that 2023 will be the year buyers finally start to do something about it.<\/p>\n\n\n\n<p>&#8220;When times are tough, test your products,&#8221; Kirner said. &#8220;With an economic downturn on the horizon, CISOs are making sure they are investing in the most effective tools to maximize cyber ROI. As a result, we\u2019re seeing CISOs more proactively test core cyber tools using red teams, breach simulations, and other internal tools. This has led to an increase in solution testing, with products that can deliver measurable results winning out over products that don\u2019t live up to their own claims.&#8221;<\/p>\n\n\n\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ResilienCyCon: You Will Be Breached So Be Ready<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"End-Users-Are-Still-the-Trouble-Spot\"><\/span>End Users Are Still the Trouble Spot<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Despite the higher stakes and global threats, you can bet that the attack vectors will largely remain the same. The usual avenues such as email <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a>, credential compromise, and exploitation of vulnerabilities will continue and even expand. Add social media scams and the growing use of convincing deepfakes and it becomes clear that users are under siege and constant vigilance is required.<\/p>\n\n\n\n<p>Joanna Huisman, senior vice president of strategic insights and research at KnowBe4,&nbsp;believes the answer to attacks across so many channels lies in a shift in focus to creating a security culture within organizations across the globe, supported by <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">security awareness training<\/a> that covers these newer channels as well as the traditional avenues used by attackers.<\/p>\n\n\n\n<p>\u201cThe need for security awareness training is now clear to most organizations, and they are starting to evolve from just training to additional emphasis on behavior and culture,\u201d said Huisman. \u201cThere has been a positive momentum toward building a strong security culture globally that involves support from executives and the entire employee base.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Automation-and-Services-Grow-in-Importance\"><\/span>Automation and Services Grow in Importance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Given the complexity and volume of threats, automation and services may be the best hope for most organizations to protect themselves.<\/p>\n\n\n\n<p>Whether in the form of services provided by <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\" target=\"_blank\" rel=\"noreferrer noopener\">managed security service providers (MSSPs)<\/a>, virtual executives to helm their security strategies, consultants brought in, or <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soc-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">security operations centers (SOCs)<\/a> provided on tap by big vendors and MSPs, 2023 is sure to see more and more companies bringing in external reinforcements.<\/p>\n\n\n\n<p>SMBs, in particular, will be keen to shed the load, so that they can focus on core competencies instead of being mired in the latest virus or ransomware outbreak. Some will call on providers to guide them through the relentless cyber storm.<\/p>\n\n\n\n<p>\u201cAs the cyber risk for small and medium size businesses keeps growing and more business owners see this as an actual threat to the existence of their business, the notion that every organization needs a CISO \u2014 or a professional that is accountable for cybersecurity \u2014 becomes more popular,\u201d said David Primor, founder and CEO of Cynomi. \u201cOrganizations are realizing that security tools by themselves are insufficient and that strategy to coordinate and govern the usage of these tools is critical.\u201d<\/p>\n\n\n\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hyperautomation and the Future of Cybersecurity<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"More-Companies-Ditching-Cookies\"><\/span>More Companies Ditching Cookies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Google has promised to eliminate third-party cookies in Chrome browsers by 2024, and others are following suit. If Google eliminates them, others have little choice but to go along with it or face a backlash from users.<\/p>\n\n\n\n<p>From a user perspective, this is great news, as it results in more online privacy. Marketing personnel won\u2019t appreciate it so much since cookies have been used to gather a treasure trove of individual user data across sites, which typically ends up in advertisers&#8217; hands to create personalized and intrusive ads.<\/p>\n\n\n\n<p>\u201cAt the moment, Google is thinking of new ways to track its flow, such as through&nbsp;<a href=\"https:\/\/blog.google\/products\/ads-commerce\/2021-01-privacy-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">FLoC<\/a>,\u201d said Briedis. \u201cEven though we cannot say that user tracking is gone, we can celebrate the era of intrusive tracking coming to an end.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"More-Metaverse-Means-More-Hacking\"><\/span>More Metaverse Means More Hacking<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The proliferation of the metaverse means there are more opportunities for cyber criminals to perpetrate attacks.&nbsp;With developers creating virtual cities and vast online worlds, cyber criminals view these as a new set of attack surfaces to exploit.<\/p>\n\n\n\n<p>The fully immersive experiences being made available online are growing so fast it is hard to keep up. Don\u2019t expect security best practices to be fully in place during the early rollouts. History tends to repeat, and new technologies generally deploy security after attacks and breaches.<\/p>\n\n\n\n<p>Retailers have begun to launch digital goods available for purchase in virtual worlds. As well as a world of new possibilities, this opens the door to an unprecedented increase in cybercrime in uncharted territory.<\/p>\n\n\n\n<p>Avatars, as they are currently being implemented, could be used as a gateway to personally identifiable information (PII) by attackers. People can use their avatar to purchase goods and services in virtual cities. But that means they need fast access to digital wallets, crypto exchanges,&nbsp;NFTs, and various currencies and exchanges. Threat actors see this as yet another emerging attack surface.<\/p>\n\n\n\n<p>\u201cBiometric hacking could also become a real possibility because of the AR- and VR-driven components of virtual cities making it easier for a cyber criminal to steal fingerprint mapping, facial recognition data, or retina scans and then use them for malicious purposes,\u201d said Manky. \u201cIn addition, the applications, protocols, and transactions within these environments are all also possible targets for adversaries.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"More-Regulatory-Scrutiny\"><\/span>More Regulatory Scrutiny<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With so many threats and so much consumer data exposed, more cyber regulation is a certainty. And with Elon Musk\u2019s purchase of Twitter, expect content monitoring and hate speech to remain big issues too.<\/p>\n\n\n\n<p>\u201cRegulators like the SEC, FTC, and the DoD will demand more transparency and accountability,\u201d said Igor Volovich, vice president of compliance strategy at Qmulos. \u201cBusiness leaders at the highest levels, even CEOs, will be held accountable for negligence and asked to validate the state of their security programs, exposing themselves to personal and even criminal liability.\u201d<\/p>\n\n\n\n<p>A good portion of the laws coming down the pipeline will revolve around privacy. We already have the EU\u2019s GDPR, which set a global precedent. California and New Zealand issued their own versions that are similar to GDPR in many ways. 2023 will bring more of the same \u2014 perhaps even a U.S. federal privacy statute.<\/p>\n\n\n\n<p>\u201cIndia will discuss its Personal Data Protection Bill \u2014 the Indian version of the GDPR,\u201d said Briedis. \u201cSimilarly, the U.S. may be discussing its own American Data Privacy and Protection Act, which will help establish a framework for data protection at the federal level. 2023 will be a big year for privacy laws.\u201d<\/p>\n\n\n\n<p><em>See our comprehensive overview of <\/em><a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Security Compliance &amp; Data Privacy Regulations<\/em><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Finally-Some-Hope\"><\/span>Finally, Some Hope<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Yes, things look dire, and dire things will indeed come for those that continue as before and fail to adapt to the new cyber reality. Those that heed these warnings, trends, and predictions, on the other hand, have taken the first step toward addressing imminent threats and lowering their risk profiles.<\/p>\n\n\n\n<p>\u201cI see the light at the end of the tunnel because people are starting to value their data, pushing businesses and governments to take action,\u201d said Briedis.<\/p>\n\n\n\n<p>Manky concurs. Although the world of cybercrime and the attack methods of cyber adversaries in general continue to scale at great speed, he thinks good news lies ahead. Many of the tactics cyber criminals are using to execute attacks are familiar, which better positions security teams to protect against them.<\/p>\n\n\n\n<p>\u201cSecurity solutions should be enhanced with&nbsp;ML and AI so they can detect attack patterns and stop threats in real time,\u201d said Manky. \u201cA broad, integrated, and automated&nbsp;<a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity mesh<\/a> platform is essential for reducing complexity and increasing security resiliency. It can enable tighter integration, improved visibility, and more rapid, coordinated, and effective response to threats across the network.\u201d<\/p>\n\n\n\n<p>Broader security protections could also come in the form of solutions that better control data regardless of its location, such as the emerging category of data security posture management (DSPM).<\/p>\n\n\n\n<p>&#8220;Every organization, regardless of the size, keeps their data in at least two to three cloud environments,&#8221; said Normalyze CTO Ravi Ithal. &#8220;The more the organization scales, the more proliferated its data becomes, making it harder to protect the data, keep it secure, and keep tabs on who has access to what. CISOs will turn to data security posture management (DSPM), or the ability to learn where sensitive data is anywhere in your cloud environment, who can access these data, and their security posture and deploy these solutions to start a new era of data security.&#8221;<\/p>\n\n\n\n<p><strong>Read next:<\/strong>&nbsp;<a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Is the Answer to Vulnerabilities Patch Management as a Service?<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d700bd9f432-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d700bd9f432\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d700bd9f432\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d700bd9f432\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d700bd9f432\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d700bd9f432\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d700bd9f432\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>After a year that saw massive ransomware attacks and open cyber warfare, the biggest question in cybersecurity for 2023 will likely be how much of those attack techniques get commoditized and weaponized. &#8220;In 2022, governments fought wars online, businesses were affected by multiple ransomware gangs, and regular users&#8217; data was constantly on hackers&#8217; radars,&#8221; said [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":17797,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[2369,4633,23707,3790,1146,3414,2478,730,31944,23458,5277,31978],"b2b_audience":[33],"b2b_industry":[53,56],"b2b_product":[31788,382,403,394,389,380,31790,31775,392],"class_list":["post-26177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cloud-security","tag-compliance","tag-critical-infrastructure-cybersecurity","tag-cybersecurity","tag-malware","tag-network-security","tag-ransomware","tag-security","tag-software-supply-chain","tag-supply-chain-security","tag-web-security","tag-wiper-malware","b2b_audience-awareness-and-consideration","b2b_industry-energy","b2b_industry-government","b2b_product-advanced-persistent-threats","b2b_product-application-security-vulnerability-management","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-email-security","b2b_product-managed-security-services","b2b_product-policy-compliance","b2b_product-ransomware","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Outlook 2023: Cyber Warfare Expands Threats | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Wiperware, ransomware, critical infrastructure and the software supply chain head a long list of threats, but there&#039;s hope for cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Outlook 2023: Cyber Warfare Expands Threats | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Wiperware, ransomware, critical infrastructure and the software supply chain head a long list of threats, but there&#039;s hope for cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-05T19:36:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-06T18:53:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"692\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Security Outlook 2023: Cyber Warfare Expands Threats\",\"datePublished\":\"2023-01-05T19:36:21+00:00\",\"dateModified\":\"2023-01-06T18:53:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/\"},\"wordCount\":2571,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg\",\"keywords\":[\"cloud security\",\"compliance\",\"Critical Infrastructure Cybersecurity\",\"cybersecurity\",\"malware\",\"network security\",\"ransomware\",\"security\",\"software supply chain\",\"supply chain security\",\"Web security\",\"wiper malware\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/\",\"name\":\"Security Outlook 2023: Cyber Warfare Expands Threats | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg\",\"datePublished\":\"2023-01-05T19:36:21+00:00\",\"dateModified\":\"2023-01-06T18:53:12+00:00\",\"description\":\"Wiperware, ransomware, critical infrastructure and the software supply chain head a long list of threats, but there's hope for cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg\",\"width\":900,\"height\":692,\"caption\":\"Cybersecurity hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Outlook 2023: Cyber Warfare Expands Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Outlook 2023: Cyber Warfare Expands Threats | eSecurity Planet","description":"Wiperware, ransomware, critical infrastructure and the software supply chain head a long list of threats, but there's hope for cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/","og_locale":"en_US","og_type":"article","og_title":"Security Outlook 2023: Cyber Warfare Expands Threats | eSecurity Planet","og_description":"Wiperware, ransomware, critical infrastructure and the software supply chain head a long list of threats, but there's hope for cybersecurity.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/","og_site_name":"eSecurity Planet","article_published_time":"2023-01-05T19:36:21+00:00","article_modified_time":"2023-01-06T18:53:12+00:00","og_image":[{"width":900,"height":692,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg","type":"image\/jpeg"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Security Outlook 2023: Cyber Warfare Expands Threats","datePublished":"2023-01-05T19:36:21+00:00","dateModified":"2023-01-06T18:53:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/"},"wordCount":2571,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg","keywords":["cloud security","compliance","Critical Infrastructure Cybersecurity","cybersecurity","malware","network security","ransomware","security","software supply chain","supply chain security","Web security","wiper malware"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/","url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/","name":"Security Outlook 2023: Cyber Warfare Expands Threats | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg","datePublished":"2023-01-05T19:36:21+00:00","dateModified":"2023-01-06T18:53:12+00:00","description":"Wiperware, ransomware, critical infrastructure and the software supply chain head a long list of threats, but there's hope for cybersecurity.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/hacker-3342696_1920-e1672947320490.jpg","width":900,"height":692,"caption":"Cybersecurity hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-predictions-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Security Outlook 2023: Cyber Warfare Expands Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/26177"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=26177"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/26177\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17797"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=26177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=26177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=26177"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=26177"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=26177"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=26177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}