drj logo

"*" indicates required fields

Name*
Region*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
DRJ Fall 2025 Dallas Show
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2025
    • DRJ Spring 2025
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DEI
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

AI & Cybersecurity Expert Insights for 2025

by Jon Seals | December 4, 2024 | | 0 comments

By Neil Jones, CISSP, Director of Cybersecurity Evangelism at Egnyte

Intersection of AI & Cybersecurity:

Recent reports indicate that nearly 100% of IT leaders consider AI models as crucial for their business success, but only 48% of IT professionals are confident about their ability to execute a strategy for leveraging AI in cybersecurity. In 2025, we can anticipate the knowledge gap to widen, as AI models’ technical capabilities will likely outstrip IT teams’ ability to govern their responsible use. 

The gap can be closed by providing technical teams with advanced AI training, adopting company-wide responsible AI usage policies, and encouraging users to access generative AI solutions that are formally blessed by the organization.

Explosion of AI-Powered Malware: 

Industry reports show that three-quarters of IT professionals are concerned that AI will be utiized for cyberattacks and other malicious activities. Throughout 2025, we can anticipate an ongoing battle between AI being leveraged by white-hat organizations to quickly remediate their security vulnerabilities and AI being utilized by black-hat attackers to develop more effective attack techniques. AI-powered attack vectors include the following:

  • Highly-targeted phishing e-mails that mimic the tone and language of actual senders. 
  • Social media videos that offer “free trials” of popular- but relatively expensive- software. When users download a “free trial” of the software, they unknowingly download malicious code. . 
  • Fictitious audio and video messages that direct co-workers to take immediate action, like sending a wire transfer to make an immediate payment or recommending that a junior employee overlook traditional security protocols to accommodate a senior employee’s just-in-time request. 
  • Malware that continuously “mutates” to adapt to preventative security technology. 

Although this battle isn’t easily won, your company can get an advantage against cyberattackers by utilizing the latest issue-detection software, providing user education on a quarterly basis, and implementing effective processes to prioritize IT security threats. To prevent downloads of malicious code, users should always be reminded to follow traditional IT procurement procedures for software access. 

One of the best ways to address this issue is by adopting the old-school technique of “dual-control.” For example, if a video message is received by a leader that encourages immediate action, the user performing the action should verify the request’s authenticity using a different communication medium, such as by texting him/her directly. 

Ransomware:

Ransomware was a $1 billion+ illicit global business in 2023, and all indications are that ransomware payments will come in at or near the same total in 2024.

We can anticipate the following new developments in 2025:

  • Sophisticated ransomware-generated extortion attacks will continue to target larger businesses and government entities, whose data generally contains Personally Identifiable Information (PII) and therefore has higher value. The same organizations’ reputations are more significantly impacted by successful cyberattacks, so they are more likely to make proactive ransom payments to prevent exfiltration of their data. 
  • Traditional ransomware attacks will continue to target small- and medium-sized businesses that lack ransomware detection and recovery technology. 
  • Cyber-insurers will continue to scrutinize their insureds’ ransomware protection and data recovery activities closely. 
  • Total global ransom payments are expected to increase, as ransomware gangs continue to disband and re-form under new affiliations.  

The best way to manage the threat of ransomware is by adopting ransomware detection and snapshot recovery technology, and educating your users about the potential dangers of phishing attacks. 

Proliferation of Wiper Technology:

If there’s any cybersecurity topic you need to familiarize yourself with in 2025, it’s the increased usage of wiper technology by cyber-criminals. With ransomware, the goal is to encrypt data, and then to collect a ransom to restore the target company’s data. The goal of wipers is to destroy the target company’s data, making incident recovery virtually impossible. As a result, wiper technology has major value in an adversary’s hands, and could potentially be leveraged by malicious insiders and even business competitors who want to gain an illicit market advantage. 

Although this technology space is moving quickly, effective Business Continuity & Data Recovery (BCDR) procedures can go a long way in preventing a debilitating wiper attack. In addition, you should consider snapshot recovery solutions that take snapshots of your data environment on a regular basis. Finally, immediate detection of suspicious log-ins into your IT environment can discourage such attacks. 

Related Content

  1. Resilience Reads: Redmond on Balancing Work, Life, and Resilience
  2. Disaster Recovery Journal
    Exciting 2025 Predictions for Technology Trends
  3. Disaster Recovery Journal
    JOURNAL

Recent Posts

SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel

May 13, 2025

Backblaze Drive Stats for Q1 2025

May 13, 2025

Sectigo and Altron Security Announce Strategic Channel Partnership to Enhance Certificate Lifecycle Management in South Africa

May 13, 2025

Asigra Unveils SaaSAssure 2025 Featuring Granular Restore and Autodiscovery for Key Business Apps

May 13, 2025

STACK Infrastructure Closes $1.4 Billion in Green Financing to Support its Growing Portfolio of Stabilized Hyperscale Assets

May 13, 2025

Stackpack Raises $6.3M to Solve the $475B Vendor Chaos Problem

May 13, 2025

Archives

  • May 2025 (32)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2025

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2025 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy