Security professionals brace for a new wave of emerging cybersecurity threats

Issue 4 2023 Editor's Choice, Information Security, News & Events

Security professionals have their jobs cut out for them, with 74% saying their organisation’s sensitive data was potentially compromised or breached in the last year, according to Forrester.

New research from Forrester shows the percentage of external attacks remained constant, with a slight (2%) increase in internal incidents. However, the firm says while security and risk leaders, including chief information security officers (CISOs), continue to battle existing threats, the rise of generative AI tools, geopolitical threats, and increased cloud complexity are forcing security teams to change the way they defend against these emerging threats.

Forrester’s recently published report, Top Cybersecurity Threats in 2023, explores the top five established and emerging cybersecurity threats organisations will face in 2023 and offers recommendations for defending against each of them.

“Cybersecurity threats continue to plague organisations, multiplying like Mogwai in the 1984 hit movie ‘Gremlins’ (just don’t feed them after midnight). Forrester data shows that almost three-quarters of organisations reported one or more data breaches in the past 12 months,” writes Brian Wrozek, Forrester Principal Analyst and lead author of the report.

Established and emerging threats vie for CISOs’ attention

Forrester’s report highlights the tug-of-war faced by security professionals, saying security teams have to remain vigilant against known threats while still making sure to carve out time to address new threats stemming from emerging technologies. 

The firm believes the top threats of 2023 will be a combination of old and new ones. The top two established threats include:

1. The continued growth of ransomware. The report points out that ransomware remains a key concern although the company says it has evolved. Today, bad actors are doubly extorting their victims, demanding money to prevent the leaking of the stolen data as well as the ransom to decrypt files.

2. The human elements of BEC remaining unaddressed. Business email compromise (BEC) is the combination of social engineering with email and phishing tactics. Forrester warns that although email security technology continues to advance, technology alone is insufficient. The firm points out that the human element in security has either been dismissed or “limited to compliance-driven, outdated, and confusing security awareness and training programmes.”

When it comes to emerging threats, Forrester says that what used to be considered tomorrow’s threats are quickly becoming today’s headaches for security leaders. It has pegged the top three emerging security threats in 2023 as:

1. AI deployments. The power of applications such as ChatGPT is raising concern that bad actors could poison data to alter the outcomes of algorithms. Forrester says this will undermine AI’s reliability and performance. Since so much of our current cybersecurity relies on machine learning and AI for detection, this poses a real and immediate issue.

2. Cloud computing. The growing reach and complexity of cloud environments, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) computing, means misconfigurations and ineffective security controls will lead to more data compromises.

5. Geopolitical uncertainty. Forrester points out that the war in Ukraine shows no signs of abating. The firm adds that this hybrid war ─ involving both the cyber and physical realms ─ sets the tone for future escalations. As such, public and private organisations should prepare for increased threats.

Security isn’t a cost centre, it’s a revenue necessity

Looking at practical ways to help CISOs address these and other emerging threats, Forrester has suggested the closer examination of three externalities for security leaders to protect their budgets from macroeconomic headwinds. In a new report, CISOs Tactics to Win Every Budget Battle, Forrester’s methodology demonstrates how cybersecurity spending directly impacts revenue.

“CISOs already know that cybersecurity is a core competency of their businesses. Other executive leaders may not. This is often in part because security leaders failed to highlight how many externalities force security spending. Those externalities include customers, cyber insurers, and regulators,” writes Jeff Pollard, Forrester VP and Principal Analyst and co-author of the report.

Forrester experts say that when the externalities have been identified, CISOs can begin collecting the information that will help them to overcome budgetary pressures. CISOs will then be better able to prove that cybersecurity is the cost of doing business. Forrester’s Pollard adds, “Cost of sale (CoS) and cost of goods sold (CoGS) do not factor in cybersecurity costs, and CISOs need to change that.”

The Forrester methodology is aimed at helping deliver hard evidence of how cybersecurity spending directly impacts revenue. More particularly, it can assist security leaders in defending their security budgets to the board, C-suite, and other stakeholders, while also ensuring they are adequately equipped to face the rapid growth of new and emerging cybersecurity threats.


Security leaders looking to better understand the new emerging security threats as well as the methodology to help them secure the budget needed to fight them should contact Joan Osterloh (josterloh@forrester.com), Forrester’s authorised Research Partner for South and East Africa.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.