Versatility is always a plus in the business world, and increasingly, technologies and disciplines that weren’t initially developed specifically for cybersecurity are being repurposed to strengthen digital defenses. From digital twins to the Internet of Things, tech tools commonly used in businesses today can provide added value by helping organizations shore up their cybersecurity strategies.

Below, members of Forbes Technology Council discuss leading-edge tech that can be leveraged for boosting digital security. Check out these creative uses (or reuses) to better protect your organization against evolving threats.

1. Quantum Computing

Quantum computing, developed to solve extremely complex computational problems beyond the capability of classical computers, poses both a challenge and an opportunity for cybersecurity. It has the potential to break current encryption methods. However, it can also be used for quantum communication, for example, and quantum key distribution (QKD) offers a new level of security for sensitive data transmissions. – Greg Ombach, Airbus

2. RowHammer Mitigation

RowHammer mitigation, introduced to prevent data corruption in DRAM memories, can also prevent unauthorized users from gaining kernel privileges. A bad actor can initiate a RowHammer attack, which flips bits in memory, to change bits in operating system data structures that prevent unauthorized data access. DRAM remapping and other RowHammer techniques can help mitigate these attacks. – Steven Woo, Rambus

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

3. Automation

Automation wasn’t necessarily designed with security in mind. Yet, we see most security incidents happening through misconfigurations or changed configurations—often by accident. Automation, as part of change management strategies, reduces the likelihood of accidental changes that can ultimately lead to a breach and can force authorization mechanisms where they did not exist before. – Vincent Danen, Red Hat

4. Quantum Machine Learning

Every device, system and application needs to be upgraded to post-quantum cryptography and digital signatures to stay safe. Quantum machine learning shows increased sensitivity and accuracy over classical techniques—which may mean that QML allows us to better find the needles in the cybersecurity haystacks. – Scott Buchholz, Deloitte

5. Observability

Observability was originally developed to monitor application performance and availability, but it can be invaluable in security. The ability to trace a digital transaction from the user to the back end, gaining visibility into actions and behavior, offers a great source of data for threat detection, cyber forensics and incident response. This is why observability and security are converging. – Bernd Greifeneder, Dynatrace

6. End-User Computing Platforms

End-user computing platforms, originally designed to resolve traditional IT issues, are now enhancing cybersecurity. They use real-time query and response capabilities to address digital disruptions. Over time, these platforms have evolved to detect unusual activities, like unauthorized processes or suspicious network connections, significantly improving real-time threat detection and response. – Ian van Reenen, 1E

7. Soulbound Tokens

Soulbound tokens, though not originally built for cybersecurity, could enhance email security. In contrast to nonfungible tokens, which are transferable signatures, SBTs are issued to a single owner forever. This means that SBTs could be tied to authorized emails to curb phishing attempts where attackers slightly alter email addresses, ensuring emails are from genuine sources. – Adam Lieberman, Finastra

8. AI

Artificial intelligence can help security professionals and developers alike select the best open-source software packages for use in application development based on quality, security, activity and popularity. True to the spirit of AI, the process doesn’t require additional technical skills—it can be done through normal questions and answers. – Varun Badhwar, Endor Labs

9. Blockchain Technology

Blockchain technology, initially created for cryptocurrencies, can be repurposed to enhance cybersecurity. Its decentralized, immutable ledger can secure data transactions, prevent tampering and ensure integrity. By using blockchain for identity verification and secure communication, organizations can bolster their cybersecurity frameworks effectively. – Savitri Sagar, Kenzo Infotech

10. Field-Programmable Gate Arrays

Field-programmable gate arrays were developed to allow chip designers to rapidly test different types of integrated circuit designs or update an already manufactured product by reprogramming the circuit logic. FPGAs can be used in cybersecurity applications like advanced firewalls or agile cryptographic processing, allowing the hardware to adapt to newly developed post-quantum algorithms. – Kim Bozzella, Protiviti

11. Natural Language Processing

One technology that could be repurposed for cybersecurity is natural language processing. Initially developed for language translation and text analysis, NLP can be leveraged to analyze and identify phishing emails, detect social engineering tactics, and predict potential security threats based on language and communication patterns, enabling effective threat detection and incident response. – Sarah Choudhary, Ice Innovations

12. Network Address Translation; HTML5

In my opinion, network address translation and HTML5 can be repurposed for cybersecurity. Nowadays, all home PCs and other devices are behind NAT and a firewall. NAT was initially created to solve issues with IP address depletion and scaling in routing, among other things. Before NAT, home computers had external IPs and were internet-facing. HTML5 led to Adobe Flash being redundant and deprecated, and Flash was an enormous source of security vulnerabilities. – Julio Fort, Blaze Information Security

13. Digital Twins

Originally developed to optimize industrial operations, digital twins can significantly boost cybersecurity in identity and access management. By creating a virtual replica of an organization’s IAM framework, digital twins allow for safe, real-time testing of security policies and system updates without risking data. This enables proactive threat modeling and vulnerability assessment for a robust defense. – Craig Davies, Gathid

14. Data Science

The field of data science is a great example of a discipline that wasn’t originally developed as a cyber tool but that today underpins the most advanced technologies used in cybersecurity, such as machine learning, automation and information processing. Data science has also fueled interdisciplinary collaboration to address emerging cybersecurity challenges. – Mike Lefebvre, SEI

15. Smart Grid Technology

Originally developed for efficient energy distribution, smart grid technology can be adapted to monitor and secure large-scale IT networks. The same principles that manage power distribution can be applied to dynamically reroute network traffic away from potential threats, enhancing resilience against distributed denial-of-service attacks. – Mani Padisetti, Digital Armour

16. Identity Verification

Identity verification is quickly moving from Know Your Customer, Anti-Money Laundering and compliance into the cybersecurity stack. Account takeovers and password resets have become the new threat vectors, both for employee and customer systems. When a bad actor is attempting to take over an account to access critical systems or to transfer customer assets out, reconfirming their identity is often the only effective solution. – Pat Kinsel, Proof (fka Notarize)

17. Edge Computing

Edge computing, developed to process data closer to its source, can be repurposed for improved cybersecurity. By distributing data processing and storage across multiple nodes, edge computing reduces the risk of centralized data breaches. It also enables real-time threat detection and response at the network edge, enhancing security for Internet of Things devices and remote operations. – Marc Fischer, Dogtown Media LLC

18. Network Virtualization

Network virtualization was designed to save network resources by creating multiple virtual networks on one physical infrastructure. Even though it wasn’t designed for security, it has become a security tool. By isolating network traffic into separate virtual networks, you can reduce the impact of a breach. This segmentation makes it harder for attackers to move laterally in a network. – Sarath Babu Yalavarthi, AT&T

19. Digital Signatures

Originally developed to authenticate documents, digital signatures can be repurposed to secure software updates by verifying the authenticity and integrity of the code before it is deployed. This ensures that only legitimate updates from trusted sources are installed, protecting systems from malicious code injections and reducing the risk of supply chain attacks. – Jagadish Gokavarapu, Wissen Infotech

20. Behavioral Analytics And Social Listening Tools

Brands use behavioral analytics and social listening tools to better understand consumers and their behavior so they can enhance the customer experience in retail settings and marketing media. This technology is being repurposed to monitor social media activities, tracking user behaviors to detect anomalies or suspicious activities that may indicate insider threats or compromised data. – Sudhanshu Duggal, Procter & Gamble

Share.

Leave A Reply

Exit mobile version