What's so promising about SASE is how it simplifies what has become an incredibly complex challenge. Traditional network security was built around the idea of a defined perimeter, but with cloud apps and remote work, that perimeter has essentially dissolved. SASE helps us adapt to this new reality by providing consistent security policies and enforcement across all users and devices, regardless of their location. It helps eliminate the need to "backhaul" traffic to a central data center for security checks, which can be a real bottleneck and a poor user experience.
Distinguished Chair of the Accelerator & Principal/CEO at Stimson Center & LDA Ventures, Inc.
Answered a year ago
I'm particularly excited about the shift from signature-based detection to pattern-of-life based approaches in network security. This evolution couldn't come at a more critical time! With bots and AI systems now capable of morphing and masking their signatures, traditional detection methods are increasingly insufficient on their own. What's fascinating is how we're finally recognizing that the entire TCP/IP stack can be compromised or flooded with traffic - including at the application layer - even when nothing appears anomalous at the network layer. This holistic view of network security represents a significant maturation in our field. The most promising aspect of this trend is the integration of AI to detect rogue bots and malicious AI across the complete TCP/IP stack. We're essentially fighting fire with fire - using advanced pattern recognition and behavioral analysis to identify threats that deliberately evolve to evade detection. This approach acknowledges the dynamic nature of modern threats and builds adaptive defenses rather than static barriers. The future of network security lies in these intelligent, comprehensive monitoring systems that understand normal behavior patterns and can quickly flag deviations - not just looking for known signatures but identifying suspicious activities based on contextual understanding of what "normal" looks like for each unique network environment.
One network security trend we're particularly excited about is the growing adoption of Secure Access Service Edge (SASE). SASE combines networking and security functions, such as SD-WAN, firewalls, and zero-trust network access, into a single, cloud-native service. This approach allows organisations to securely connect users to applications wherever they are, without relying on traditional perimeter-based security models. What makes SASE so promising is its ability to deliver consistent, identity-driven protection across all locations and devices, which is vital in today's hybrid and remote-first environments. It simplifies infrastructure, reduces latency, and gives IT teams centralised visibility and control, helping businesses scale securely without piecing together multiple solutions. As cyber threats become more complex and workforces become more decentralised, SASE offers a forward-thinking approach to embedding security into the fabric of everyday connectivity, making it not just a trend but a foundational shift in how networks are secured.
One exciting trend is that generative AI alerts have quickly become one of the top five most-implemented rules on protection platforms to fight against cyberattacks. From my perspective in data recovery, I see the aftermath when security measures fail - corrupted databases, encrypted files, and compromised systems that require extensive recovery efforts. The rapid adoption of generative AI alerts represents a fundamental shift from reactive to proactive security. These AI systems can identify patterns and anomalies that traditional rule-based systems miss, often catching threats before they can cause the kind of data loss that brings clients to us. What's especially promising is the speed of implementation we're seeing across the industry. When a security technology becomes one of the top five most-implemented rules this quickly, it signals both effectiveness and urgency. Organizations are recognizing that AI-powered threat detection isn't just a nice-to-have - it's becoming essential infrastructure for protecting their data assets. This trend gives me hope that we'll see fewer catastrophic data loss incidents in the future, though it also reinforces why robust data recovery solutions remain critical as a last line of defense.
One network security trend I'm particularly excited about is the rise of Zero Trust Architecture (ZTA). It's promising because it shifts away from the traditional perimeter-based security model, focusing on verifying every user and device, regardless of their location. In my experience, this model is crucial in today's landscape where remote work and cloud services are prevalent. It limits lateral movement within the network, even if an attacker gains initial access, making it harder for breaches to spread. We recently started implementing ZTA at my company, and it has significantly improved our ability to monitor and control access. It's not just about blocking threats—it's about ensuring that trust is never assumed, which makes the entire network much more resilient. With cyber threats becoming more sophisticated, I believe Zero Trust will be a foundational approach to securing networks in the future.
One network security trend I'm really excited about is the rise of Zero Trust Architecture. Instead of assuming everything inside your network is safe, Zero Trust works on the idea that no one and nothing should be trusted automatically. Every user, device, and request has to prove it belongs—every time. What makes this trend so promising is that it's finally becoming practical. Tools like identity-aware proxies, microsegmentation, and real-time device checks are making it easier to implement without slowing teams down. In a world where remote work, cloud apps, and API calls are everywhere, this approach just makes sense. It helps prevent lateral movement in attacks, protects against compromised credentials, and gives teams better visibility. Zero Trust isn't just a security upgrade. It's the foundation for how modern networks should work.
One of the security trends I'm most looking forward to is Zero Trust Architecture (ZTA). The idea of "never trust, always verify" flips the traditional security model on its head—and for good reason. With remote work, cloud services and BYOD (bring your own device) becoming the norm, securing just the perimeter no longer works. What I like about Zero Trust is it's adaptable. Instead of assuming users or devices inside the network are automatically safe, ZTA verifies identities, checks device posture and enforces least-privilege access across the board. It's a smarter, more granular way to reduce risk in a world where threats can come from anywhere—even from within. I'm especially excited how Zero Trust combines multiple technologies—multi-factor authentication, micro-segmentation and real-time analytics—into a single strategy. It's not just a security trend; it's becoming a framework for modern infrastructure. As more companies adopt it, I think we'll see a big drop in large scale breaches from lateral movement or credential misuse. It's overdue and I'm glad to see it happening.