December 12, 2017 By Shane Schick 2 min read

The quest for digital transformation coupled with an array of new regulatory concerns and cyberattacks is driving enterprises to invest in cybersecurity. According to Gartner, worldwide cybersecurity spending will climb to $96 billion in 2018.

Cybersecurity Spending Increases

In its annual forecast, the analyst group said that the number represents an 8 percent rise in overall investment in antivirus, intrusion detection, monitoring and other tools to safeguard data. Survey respondents noted that the driving force behind this cybersecurity spending is a fear of data breaches.

Perhaps as a result, identity and access management products ranked high among investment priorities, growing almost 10 percent next year. Overall, Gartner reported that 60 percent of cybersecurity spending will include the purchase of multiple tools, including protection for IT infrastructure and security services.

Given the recent high-profile incidents of data theft and loss at organizations, the rise in cybersecurity spending doesn’t come as a surprise, WeLiveSecurity pointed out. Not to mention, cybercriminals are also becoming more sophisticated — as evidenced by the NotPetya and WannaCry attacks launched earlier this year.

Preparing to Meet Compliance Standards

As companies try to make better use of digital channels to serve their customers, the potential risks they face rises in parallel. However, it’s not just headline-grabbing ransomware and distributed denial-of-service (DDoS) attacks that are leading chief information security officers (CISOs) to re-examine their budgets.

According to Computer Business Review, the General Data Protection Regulation (GDPR) set to go in effect in the EU next year is also driving an increased focus on cybersecurity. Organizations must ensure that they have the resources available for what can be an onerous effort to achieve compliance with various pieces of legislation.

Gartner isn’t the only firm that’s tracking trends in cybersecurity spending. According to Cyber Security Hub, Grand View Research predicted that spending on threat intelligence products and services will reach $12.6 billion by 2025. All signs point to an increase in cybersecurity spending and investment.

More from

Generative AI security requires a solid framework

4 min read - How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny.The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM Institute for Business Value, 96% of executives say adopting generative AI makes a security breach likely in their organization within the next three years.CISA Director Jen…

Q&A with Valentina Palmiotti, aka chompie

4 min read - The Pwn2Own computer hacking contest has been around since 2007, and during that time, there has never been a female to score a full win — until now.This milestone was reached at Pwn2Own 2024 in Vancouver, where two women, Valentina Palmiotti and Emma Kirkpatrick, each secured full wins by exploiting kernel vulnerabilities in Microsoft Windows 11. Prior to this year, only Amy Burnett and Alisa Esage had competed in the contest's 17-year history, with Esage achieving a partial win in…

Self-replicating Morris II worm targets AI email assistants

4 min read - The proliferation of generative artificial intelligence (gen AI) email assistants such as OpenAI’s GPT-3 and Google’s Smart Compose has revolutionized communication workflows. Unfortunately, it has also introduced novel attack vectors for cyber criminals. Leveraging recent advancements in AI and natural language processing, malicious actors can exploit vulnerabilities in gen AI systems to orchestrate sophisticated cyberattacks with far-reaching consequences. Recent studies have uncovered the insidious capabilities of self-replicating malware, exemplified by the “Morris II” strain created by researchers. How the Morris…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today