Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Cyber resilience will define winners and losers in 2026 | Computer Weekly

By Computer Weekly by By Computer Weekly
December 20, 2025
Home Uncategorized
Share on FacebookShare on Twitter


For business leaders, if your security strategy for 2026 still revolves around keeping attackers out, you might already be behind.

Businesses must be prepared for every eventuality in the new year. Cyber attacks are becoming faster, more automated and far more disruptive. AI has given attackers the ability to move at incredible speeds, exploit vulnerabilities in seconds, and launch attacks at scale with minimal human involvement. The days of incident response teams having time to think, triage and test are long gone. But the big issue as we go into next year is what happens after the breach.

Time and time again, we’ve seen organisations rush to restore operations at all costs, overlooking data handling. When organisations are under pressure to restore services, data protection often slips down the priority list. We’ve seen it repeatedly. Breaches at Marks and Spencer and Jaguar Land Rover disrupted operations for weeks and wiped billions off valuations. And the now infamous deepfake incident at Arup showed how convincingly AI can manipulate employees in real time, with the attackers reportedly walking away with $25m.

By 2026, these situations will be normalised. Crisis rooms could be receiving conflicting information at speed while systems are partially offline. In some cases, the instructions will be from executives who aren’t real. And security leaders will be expected to make high-stakes decisions with incomplete and potentially manipulated data. 2026 will bring an even more chaotic crisis environment.

To combat this, businesses must prioritise rapid investment and deployment of privacy-enhancing technologies. Secure computation is likely to become a frontline requirement, as companies look to maintain operations during crises by safely processing their most sensitive data at speed, without ever needing to decrypt it, enabling them to respond quickly without risking further exposure.

Privacy-enhancing technologies will move from a nice-to-have to operationally critical. Instead of choosing between operational continuity and data protection, organisations can now have both. Critical workloads can continue to function during an incident without exposing underlying data to additional risk. Regulators and customers alike will start to expect this level of protection as standard.

Regulations such as DORA make it explicitly clear that organisations will be measured on operational resilience, not just preventive controls. The uncomfortable truth is that breaches will still happen but downtime, data exposure and disorder will no longer be explainable or acceptable. The companies that come through best will be those that have engineered security into how their systems operate, not simply wrapped it around the edges.

Dr Nick New is CEO at Optalysys, a data encryption specialist.



Source link

By Computer Weekly

By Computer Weekly

Next Post
CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

Recommended.

Trump AI czar talks DeepSeek, doomers and regulation

Trump AI czar talks DeepSeek, doomers and regulation

June 11, 2025
Simon Yueng of BIEL Crystal, was listed in Fortune Top 40 Under 40 Business Elites in China 2025

Simon Yueng of BIEL Crystal, was listed in Fortune Top 40 Under 40 Business Elites in China 2025

August 16, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio