• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber Crime
  • Security
  • Cybersecurity market, reflections on the future

Cybersecurity market, reflections on the future

Pierluigi Paganini February 01, 2012

Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will reach reach quote $61 billion this year, according to a report by UK-based consultancy Visiongain, an impressive amount of money that give an idea of the business. Since now we have analyzed the grows of the number of cyber threats that are affecting our digital life, it’s natural to expect a parallel expansion in the cyber security sector fro the mitigation of those adverse events.

In addition to the overt growth of the threats we are also seeing a more worrying phenomenon, technology evolution of the threats that changes each time adapting to the operational scenarios and to the growing criminal demand. While the recent economic situation forced serious cutbacks in IT spending, it has however intensified the focus of business enterprises on cyber security solutions in order to mitigate the effect of the cyber threats. Protect resources and asset from phisycal and logical prospectives is a must, minimize cyber crime that is able to induce financial losses with high cost of security breaches, and safeguard organization’s reputation, those are the main targets to reach.
The phenomenon we are discussing is not confined to some particular situations, but is following a trend across the planet, of course, with distinctive elements of growth in those areas with high technological risk for the presence of conflict or political conditions favorable to the development of cyber criminal context. The continuous use of advanced digital services by the users portends, on a time horizon of ten years,that the cyber security market will surely evolvs significantly. Markets such as Asia, especially China, and Middle Eastern ones are where we expect the highest value of investments.

Many times the risk factors have increased exponentially as the main sources of threats, cyber crime, warfare, hacktivism, different scenarios that contribute in the same way to the genesis of new and deadly threats that materialize from cyber space capable of immeasurable damages and lost of human lives in the real world.
Before anything is required to mediate a robust action, the implementation of measures to reduce the risks associated with exposure to the threat and this is only possible with considerable investments in this area.
Just on investment, although remaining in the same growth forecasts, we distinguish two different trends of growth for cyber security expenses, in a military/government field and industry/private business sector.
In the military sector investments are literally soared and this is not necessarily good indication that we are going in the right direction. The availability of large investments and the need to operate in emergency could cause waste of public money and favors the occurrence of corruption and embezzlement, as happened in Italy.
The private sector instead has experienced a period of swinging with respect to security investments. The contraction of the markets due to the global economic crisis has led to cut the costs of security, but the consequences of several attacks have led to a reassessment of the need to invest in the sector, bringing a boost to investment in security.

The two trends and the operation implemented must be analyzed in a single optics, it’s clear that in a critical context like security it is necessary to approarch the problem in a global view that involve all the actors in the decision regarding the countermeasures to implement. The Center for Strategic and International Studies (CSIS) argues in a report aimed at the 2009 presidential transition, “It is undeniable that an appropriate level of cybersecurity cannot be achieved without regulation, as market forces alone will never provide the level of security necessary to achieve national security objectives.”

The message is explicit, the appropiate security level is reacheble only with specific and strutured action driven by a shared policy.

What are the markets that will benefit mainly in terms of security of these investments? In a hypothetical list, in light of the trends exhibited, I think the major investments will be observed in the areas of Government and Utilities also in Aerospace & Defense, vital sectors for any government.  Considerable costs can be observed in markets such as Telecommunications and Banking, these sectors are most vulnerable to cyber threats, at least this is my wish into consideration the level of risk faced by the major organizations working in this areas.

In my opinion the market, unlike others, can takes advantage of a factor that distinguishes it, the constant evolution of cyber threats, this fact leads to a continuous growth of supply in terms of quality and effectiveness, with two direct consequences

  • the difficulty to patrol a market in continuous evolution from smaller companies that often take drugs other markets with a poor and low-cost deals. We are thus confronted with a condition of prime market, a market to keep up with the criminal enterprise is forced to evolve, a market that evolves its products is alive and thriving economically.
  • the need for companies and governments to secure their assets from the threats, this requires investments that can not be postponed and fortunately the level of awareness in the field begins to be high.
Pierluigi Paganini

References

http://mercatus.org/sites/default/files/publication/Cybersecurity_Dourado_WP1205_0.pdf

http://www.prweb.com/releases/prwebcyber_security/application_content_data/prweb8262390.htm


facebook linkedin twitter

China Content filtering corruption criminal activities cyber Cyber Crime cyber security cyber strategy cyber threats cyber weapon Cybersecurity Hackers Hacking Hacktivism Intelligence Internet Investigation stuxnet Trojan warfare

you might also like

Pierluigi Paganini July 14, 2025
Spain awarded €12.3 million in contracts to Huawei
Read more
Pierluigi Paganini July 13, 2025
Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Spain awarded €12.3 million in contracts to Huawei

    Intelligence / July 14, 2025

    Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

    Security / July 13, 2025

    Wing FTP Server flaw actively exploited shortly after technical details were made public

    Hacking / July 13, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

    Breaking News / July 13, 2025

    Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 13, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT