Connect with us

Cyber Security

Gartner Forecasts Global Information Security Spending to Grow 15% in 2025

Published

on

Worldwide end-user spending on information security is projected to total $212 billion in 2025, an increase of 15.1% from 2024, according to a new forecast from Gartner, Inc. In 2024, global information security end-user spending is estimated to reach $183.9 billion.

“The continued heightened threat environment, cloud movement and talent crunch are pushing security to the top of the priorities list and pressing chief information security officers (CISOs) to increase their organization’s security spend,” said Shailendra Upadhyay, Senior Research Principal at Gartner. “Furthermore, organizations are currently assessing their endpoint protection platform (EPP) and endpoint detection and response (EDR) needs and making adjustments to boost their operational resilience and incident response following the CrowdStrike outage.”

The adoption of AI and generative AI (GenAI) continues to increase investments in security software markets like application security, data security and privacy, and infrastructure protection. Through 2025, GenAI will trigger a spike in the cybersecurity resources required to secure it, leading to an expected 15% increase on security software spending (see Table 1).

Since the release of GenAI, attackers are increasingly employing tools along with large language models (LLMs) to carry out large-scale social engineering attacks, and Gartner predicts that by 2027, 17% of total cyberattacks/data leaks will involve generative AI.

As organizations continue to move to the cloud, Gartner analysts expect an increase in cloud security solutions, and the market share of cloud-native solutions will grow. The combined cloud access security brokers (CASB) and cloud workload protection platforms (CWPP) market is estimated to reach $8.7 billion in 2025, up from the forecasted $6.7 billion in 2024.

The global skills shortage in the cybersecurity industry is a major factor driving investment in the security services market (security consulting services, security professional services and managed security services) which is expected to grow faster than the other security segments.

In the Middle East and North Africa (MENA) region, end-user spending on information security is forecast to total $3.2 billion in 2025, an increase of 14% year on year (see Table 2).

“The continued growth in security spending in the MENA region is primarily driven by the constantly evolving regulatory environment and the rise in cyberattacks,” said Upadhyay. “Furthermore, digitalization and cloud migration are broadening the threat landscape for enterprises. Consequently, CISOs in the region are focusing on ensuring compliance with rapidly changing regulatory and privacy frameworks, countering persistent threats as well as addressing C-suite and board-level executives’ concerns on organizational resilience and cybersecurity posture.”

Cyber Security

A Reliable Data Backup Strategy is Very Important

Published

on

Sertan Selcuk, the Vice President of METAP and CIS Regions at OPSWAT says hackers are now targeting third-party vendors—companies that have access to critical infrastructure but often have less robust security measures (more…)

Continue Reading

Cyber Security

Cloud and IoT Vulnerabilities Expose Smart Cities and Industrial Systems to Cyber Risks

Published

on

Ezzeldin Husein, the Regional Senior Director for Solution Engineering – META at SentinelOne says cyberattacks on MEA’s critical infrastructure are becoming more sophisticated, with nation-state actors, ransomware gangs, and hacktivists targeting energy, finance, and transportation sectors (more…)

Continue Reading

Cyber Security

Cyberattacks on Critical Infrastructure Originate from Nation-State Actors or Sophisticated APT Groups

Published

on

Saran B. Paramasivam, the Regional Director for Middle East and Africa (MEA) at Zoho says the most notable trends in cyber attacks targeting critical infrastructure systems are the rise of ransomware and social engineering attacks (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.