Join Teams meetings from Zoom Rooms. Zoom & Pexip partnership

Thomas Edberg, commercial security lead at Pexip, takes us on a trip into the cyber-security future, telling us what he believes is in store for 2024.



For anyone who has gone head-to-head with an ant infestation, you know they are incredibly difficult to keep out. You can seal the perimeter, set traps, and even engage in a direct attack, but somehow, they still find a way in…and keep coming despite your best efforts.  


“The world needs to be ready for an onslaught of ants coming at us from every nook, cranny, and vulnerability across our systems in 2024,” says Thomas Edberg. “The days of planning and preparation for ‘what ifs’ are behind us, and the year ahead will be centered on taking decisive action to protect our organizations and society at large from cyber-attack.”  


So, if we know the ants are coming, what are we going to do about it? Thomas shares his top 5 predictions for the world of cyber security in 2024 – and how organizations everywhere will be stepping up their cyber game to ready their defenses. 



Prediction 1: Governments are on the ball and set much stricter rules and regulations. 


The EU’s NIS2 directive marked a decisive turning point regarding cyber-security regulation. This directive means that each EU country must take a hard look at its laws and regulations and start requiring businesses of all kinds to implement risk mitigation measures in the coming year. It’s a strong sign that the EU is taking cyber-security very seriously and a good indication that other regions will likely follow suit to protect their own interests 


Prediction 2: Organizations accept that you must invest to improve your cyber defense. 


Enough evidence shows that an attack can result in devastating financial and reputational loss for companies. And just as companies accept the need for insurance, we will see broader acceptance of the need to invest in risk management and stronger cyber defenses in 2024. For those in Europe complying with NIS2, budgeting for rising cyber risks will no longer be considered optional.  



Prediction 3: Cyber-attacks grow in number and sophistication. 


Just like ants, motivated threat actors will always find a way in. And now they’re more empowered than ever. From ‘how to’ kits available to script kiddies on the web to hacktivists who are driven by cause, we are seeing a rise in capabilities and ease of access from many sides. In addition, quantum computing will take cyber threats to a completely new realm, where anything can be decrypted.  



Prediction 4: Organizations embrace a strategy of control and collaboration. 


There are two key sides to the cyber defense coin. On the one side, I see both nations and organizations asserting more control and protection measures over their data. Data sovereignty will continue to spread across the public sector, as data that’s within sovereign borders can be managed, monitored, and protected according to local law. But on the other side of the coin, collaboration will prevail between industry and countries. People will work together to identify and clamp down on common attack methods, share learnings, and come together to create equally sophisticated defense mechanisms. 



Prediction 5: Everybody gets their backup plan in order. 


As organizations begin to accept that cyber-attack is more a matter of ‘when’ not ‘if’, they start to look at their assets and operations a bit differently. They must ask themselves: if this is attacked, then what?


To answer those key questions, business continuity planning is essential. This is your backup plan to ensure the continuation of your services, your communication, and your overall operations should the worst-case scenario occur.  



Thomas’ tip!


Business continuity/disaster recovery planning is something we know well, and we’ve helped many customers ensure that their communication can continue even in the event of a cyber-attack. Find out more here: Pexip for Business Continuity BCM & BCP Communication Platform. 



  • Government
  • Defense
  • Meet & collaborate securely
  • Secure Meetings
  • Business Continuity
Back to resources