As we head into 2025, the fast-changing world of technology continues to present new opportunities and challenges for businesses globally. Cybersecurity and AI, which were major focal points in 2024, are poised to become even more critical this year. In this blog, we’ll explore predictions and insights from various startups about what might unfold in 2025 and how these developments could impact businesses.
Aisera
Aisera anticipates that AI in IT will keep evolving with smarter AI agents, known as agentic AI, capable of independently making decisions and handling more complex tasks. Cybersecurity is expected to improve with faster threat responses and better prevention methods. The integration of AI with cloud computing and IoT devices will enhance data processing speed and system efficiency.
Aliro
Aliro attests that cybersecurity will need to address advanced threats to secure communications, necessitating new post-quantum cryptography (PQC) standards for enhanced encryption. They foresee the development of entanglement-based quantum networking as the most secure communication solution, offering protection through quantum physics properties. Additionally, Aliro expects advancements in error correction, device integration, large-scale simulations, quantum-safe implementations, and a shift towards integrating QKD with entanglement-based networks to bolster security.
AppOmni
AppOmni foresees a continued rise in SaaS-based attacks, with vulnerabilities in third-party applications posing significant risks due to undocumented legacy API endpoints and excessive public access. They emphasize adopting Zero Trust security models to prevent misconfigurations and data breaches, as well as continuous monitoring and identity management to protect sensitive data in 2025.
Cohesity
Cohesity predicts that AI will become essential in cybersecurity to combat advanced threats like phishing and social engineering attacks. As cybercriminals use AI, organizations must also adopt AI tools to protect themselves effectively. Additionally, AI is expected to create more cybersecurity jobs and make workers more productive by enhancing their skills and efficiency, especially in specific tasks like IT operations and security.
Corellium
Corellium forsees the mobile security landscape will require more dynamic and proactive approaches to address increasing vulnerabilities, such as data leaks and zero-day exploits. Virtualization and integrated security solutions will become essential, allowing testers to conduct efficient, real-time assessments without relying on physical devices or public jailbreaks. This shift towards continuous security integration will help organizations manage risks more effectively and improve their overall security posture.
Dremio
Dremio foresees AI and analytics becoming more accessible through self-service platforms, enabling companies to make faster, more informed decisions. This shift will drive demand for flexible, scalable, and efficient data architectures, such as Lakehouses, which provide unified data access, enhanced flexibility, and cost efficiency. Additionally, strong data governance and interoperability will be critical for ensuring successful data management across diverse systems.
Expel
Expel anticipates that AI will significantly influence cybersecurity and business operations by 2025, urging companies to adapt and integrate AI into their strategies. AI is expected to enhance detection and response strategies, requiring new skill sets while making security processes more efficient. Additionally, businesses will need to navigate the challenges of AI implementation, such as managing security risks and vendor claims, while benefiting from AI's ability to streamline tasks and improve productivity.
HYCU
HYCU projects a strong focus on cutting IT costs to fund key AI initiatives, driving the need for comprehensive data management strategies as AI becomes mainstream. They also expect heightened investment in data protection for third-party and SaaS environments due to rising supply chain risks, along with a shift towards cloud cost optimization and flexible data hosting models. Compliance mandates like DORA and NIS2 will further increase the demand for robust data protection, while HYCU aims to support these needs with solutions that consolidate and safeguard data effectively.
Mitiga
Mitiga sees the need to address the growing cybersecurity skills gap by upskilling existing teams through targeted training and hands-on learning. They also suggest leveraging managed services like Cloud Managed Detection and Response (Cloud MDR) and fostering partnerships with educational institutions to help bridge the gap and build resilient cybersecurity teams. These strategies are key to staying ahead of evolving threats and ensuring robust protection.
Panaseer
Panaseer highlights that in 2025, identifying "toxic combinations" of cybersecurity control failures is crucial, as these combinations of seemingly minor risks can lead to significant vulnerabilities. They emphasize the need for advanced automation and data analytics to efficiently detect and address these risks, especially as AI poses both threats and opportunities. Additionally, Panaseer stresses the importance of effective communication and swift action to mitigate these compounded risks in cybersecurity.
Secure Code Warrior
Secure Code Warrior suggests that in 2025, collaboration between AI and developers will be vital, as AI alone cannot replace skilled human developers. AI introduces both risks and opportunities, necessitating responsible use and security measures to manage AI-generated code and mitigate supply chain threats. Organizations will need to prioritize secure development practices, address technical debt from AI-generated code, and ensure junior developers can effectively integrate AI tools into their workflows.
StrongDm
StrongDM believes that while breaches may occur, smarter access management strategies can significantly minimize their impact. Enterprises should move away from outdated solutions like static passwords and over-permissive accounts, and instead implement Zero Trust principles such as Just-In-Time access, context-based authorization, passwordless authentication, and continuous monitoring. This approach will enhance security while maintaining productivity in increasingly complex IT environments.
Upstream
Upstream envisions an increasingly complex cybersecurity landscape within the automotive industry, marked by heightened challenges and evolving threats. Threat actors have already shifted toward large-scale, sophisticated attack methods, targeting not only vehicles but also interconnected systems such as EV charging infrastructure, API-driven companion apps, and dealership networks. This growing attack surface will demand a transformative and proactive approach to cybersecurity.