글로벌 엣지 AI, 클라우드, 네트워크, 보안 솔루션 전문 기업 지코어가 진화하는 사이버 위협에 대응하고, 고객의 민감한 정보는 보호하면서 원활한 사용자 경험을 제공하기 위해 기업이 참고해야 할 2025 사이버보안 트렌드를 발표했다.
AI-based security should be enhanced without restricting user convenience
“To counter intelligent cyber attackers, we need to have AI-enhanced security solutions that enable threat detection and response agility.”
On the 14th, Zicor, a global edge AI, cloud, network, and security solution company, announced the 2025 cybersecurity trends that companies should take note of to respond to evolving cyber threats, protect customers' sensitive information, and provide a smooth user experience.
Based on CDN and cloud services, Zicor has over 180 PoPs (points of presence) in 6 continents around the world. Through this extensive global network, it analyzes the trends of DDoS attacks detected and releases the ‘Zicor Radar Report’ every six months. This 2025 cybersecurity trend was also composed based on analysis of data accumulated over the years and changes in the characteristics of cyber threats.
Here are 10 cybersecurity trends that Zicore is focusing on that will influence 2025.
△Increase in zero-day vulnerabilities △AI as a weapon for attackers △AI as the foundation of cybersecurity △Increased complexity of data privacy △User authentication challenges △Increased importance of supply chain security △Balancing security and user experience △Cloud service security and incorrect environment configuration △Threats of insider attacks △Increase in edge computing and preparation for it, etc.
Zicor advised that in order to respond to intelligent cyber attackers who target zero-day vulnerabilities and launch sophisticated attacks through AI, it is necessary to have AI-enhanced security solutions to achieve threat detection and response agility.
For example, AI-generated phishing campaigns use advanced natural language processing to increase the likelihood of successful cyberattacks, while deepfake technology adds complexity by allowing attackers to impersonate executives or employees with convincing audio and video to commit financial fraud or reputational damage.
He also explained that as data privacy regulations become integrated into cybersecurity strategies, companies must be prepared to implement strict guidelines regarding data encryption. Some companies are already considering decentralized security models such as blockchain to give users greater control over their data. These security strategies, when combined with a zero-trust approach, can help strengthen both privacy and security, Zicor added.
In cybersecurity, user authentication is also becoming increasingly complex, but AI-based solutions should be used to identify bots that act like users, and the system should analyze users' behavior, records, and overall context in real time to minimize disruption to normal users.
Additionally, with supply chain security breaches projected to increase by 2025, where cyberattackers exploit vulnerabilities in third-party suppliers to infiltrate large networks, companies should invest in AI-based solutions that can investigate and monitor their supply chains.
Since almost every enterprise is connected to at least one supply chain vendor, an attack on any one of them can have a cascading effect throughout the supply chain industry. This also applies to employees who may be vulnerable to security threats due to the expansion of remote work environments, so a zero-trust security model must be implemented to protect access points, whether internal or external.
While strict security is important for businesses, it is also important to find a balance between cybersecurity and the user’s convenience. Excessively strict security measures can tire out normal users, while lax security measures can invite malicious attackers. We need to have a context-aware access management system that takes into account the user's behavior, location, and device type.
“The spread of edge computing, such as IoT, autonomous driving, and smart cities, is enabling innovation in IT infrastructure to process information closer to end users, reducing latency and improving real-time functions,” said Team Leader Kim Jin-yong of Zicor Korea. “However, this decentralization inevitably makes things more vulnerable to security as it goes beyond the scope of centralized security. Therefore, we need to strengthen edge security by professionally responding to vulnerabilities in distributed networks.”