Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Today’s Emerging Technologies will Impact Tomorrow’s Cybersecurity Processes
Cybersecurity

How Today’s Emerging Technologies will Impact Tomorrow’s Cybersecurity Processes

Robert WoodBy Robert WoodMarch 21, 2022Updated:August 3, 20224 Mins Read
Facebook Twitter LinkedIn Email
Cybersecurity Technologies
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Cybersecurity is a vast field; it’s sprawling in its disciplines, with a wide range of technologies, types of work, and needs. Somebody can work in this field for 10 years and not do everything that there is to do in it, the same could be said for entire careers. This is both incredibly exciting and in some ways daunting.

One of the reasons we have this opportunity is because technologies continue to change so rapidly. New technologies come out, technologies begin to integrate and work together, and new use cases for technologies emerge. There are a variety of emerging technologies inside of the cybersecurity field that is very exciting to me, opening up new and creative ways to grow a security program. The areas below are by no means comprehensive but serve as a snapshot of the things that are interesting to me.

True Data Tools

Security is a field dominated by data, attackers need data, defenders need data. For the longest time though our data tools were entirely centered around SIEM platforms, which are mostly for logs. Large investments have been made in these SIEM deployments all over the industry, yet we collectively have not produced insights on the same level as other organization functions like marketing or advertising teams.

Investments made in data tooling specifically geared towards security use cases is exciting. Many vendors have slightly different vernacular for this, data lakes, data mash, data warehouses, the list goes on. The point is not to advocate for a particular approach, rather, to consider a change in the way we aggregate, analyze, and model our security data. There is so much more to our field than log data.

Software Integrity Verification

The emphasis on software bill of materials (SBOM) in industry lately has correlated with solutions focused on integrity verification. In other words, using cryptographically verified build artifacts in production workloads is an exciting development inside the context of zero trust and application development. An SBOM artifact also opens up opportunities to achieve the benefits of software composition analysis to software you otherwise would have zero insights into, such as SaaS/PaaS solutions or COTS products.

This development begins to reduce the risk of compromised CI servers, which has been quickly emerging as a major threat vector, similar to active directory compromises in a corporate network.

Expanded Security Automation Tools

Security automation started to really take off with the introduction of SOAR solutions, this was a game-changer. There has been exciting work happening as of late around more functions, such as:

  • Automated penetration testing
  • Attack surface discovery
  • DevSecOps pipeline orchestration
  • Vulnerability aggregation and reporting

With the explosion of work to do in security and the shortage of people, automation is critical. This trend is exciting because it enables teams to quickly build small and large automated processes, all of which have compounding benefits, like Zapier for security teams. This class of tooling also alleviates the need for highly skilled software engineers to exist on or support teams to build and maintain tool integrations and the subsequent logic to drive process automation.

Concluding Thoughts

There’s so much change happening in the Cybersecurity Field, the three examples above are a small snapshot of things that I am personally excited about. I suspect that I could write this article in a year and feel quite differently. However, each of these examples creates multiplier effects inside of a security team, something that is desperately needed as we are also battling a workforce shortage across the entire field. In particular, embracing and operationalizing data and process automation is a definitive step along the maturity curve for cybersecurity as a discipline.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

data data tools featured
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Q2 Cloud Shakeup: AWS Losing Ground to Microsoft, Google, Oracle

August 7, 2025

AI Hyperscaler Race: Sprinting — Microsoft, Google, Oracle; Strolling — AWS

August 7, 2025

Oracle Joins OpenAI’s Stargate Project with 4.5GW AI Infrastructure Boost

August 6, 2025

AI Agent & Copilot Podcast: Volt Technologies’ Mason Whitaker on Partner Opportunities With MCP

August 6, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Q2 Cloud Shakeup: AWS Losing Ground to Microsoft, Google, Oracle
  • AI Hyperscaler Race: Sprinting — Microsoft, Google, Oracle; Strolling — AWS
  • Oracle Joins OpenAI’s Stargate Project with 4.5GW AI Infrastructure Boost
  • AI Agent & Copilot Podcast: Volt Technologies’ Mason Whitaker on Partner Opportunities With MCP
  • Simplifying Agentic AI: Inside Amazon Bedrock AgentCore’s Capabilities

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }