The Growing Impact Of AI And Quantum On Cybersecurity

Image: Depositphotos

Source: Cognitive World on Forbes

In mid-2025, we are entering the early stages of a new age of digital transformation where networked technologies that combine engineering, computer algorithms, and culture are becoming impactful on a global scale. The upcoming digital revolution and technological convergence will drastically affect our patterns of living, working, and networking in the near future.

It is certain that science and technology will continue to propel humanity ahead at an exponential pace, and adapting to the emerging technological ecosystem will be critical to making that vision a reality. Organizations that aspire to succeed in the new digital economy must prioritize innovation, reliability, quality, cost-effectiveness, and security. The amalgamation of artificial intelligence with quantum computing will transform existing computational paradigms, heralding a promising future, but with risks.

Digital Transformation Propelled by Emerging Technologies

Significant technical innovation is defining the transformative digital age. It is a time in history characterized by information exchange and analysis by intelligent systems powered by artificial intelligence algorithms and developing technologies. Such a digital revolution may increase efficiency and economic success, but it also introduces substantial security dangers. The transformative effects of emerging technologies in this year by artificial intelligence and quantum computing will be hugely impactful; however, their cybersecurity challenges on society will require the need for proactive security adaptation and collaboration to mitigate new threats.

Cybersecurity Challenges for The New Technological Era

The growing complexity of AI-enabled cyberattacks, as well as the urgent need for strong defensive systems, are serious cybersecurity issues. As organizations become increasingly linked and data-driven, their vulnerabilities grow. A proactive security posture, rather than a reactive one, is necessary to prosper and survive. This includes the need for ongoing monitoring, enhanced threat intelligence, and thorough incident response plans.

Cybersecurity is more than just an IT concern; it is an essential component of every company strategy. In this age of instant digital connectivity, every company’s operation, reputation, brand, and income streams are all at risk. Cybercrime is an issue that impacts every size company. Cybersecurity Ventures estimates that the cost of cybercrime will reach $10.5 trillion USD by the end of this year. Cybercrime To Cost The World $10.5 Trillion Annually By 2025 (cybersecurityventures.com)

The Impact Of Artificial Intelligence on Cybersecurity

Cybersecurity and AI are key areas of focus in the emerging digital ecosystem. Artificial intelligence (AI) systems aim to reproduce human characteristics and processing power in a machine and outperform human speed and constraints. It is already taking place. Artificial intelligence (AI)-enabled computers are mostly used for automation tasks, including speech recognition, learning, planning, and problem-solving. By prioritizing and acting on data, AI technologies can make decision-making more efficient, especially in bigger networks with numerous users and factors.

For cybersecurity, artificial intelligence may expedite the swift detection and identification of cyber threats. Cybersecurity companies have developed AI-powered software and platforms that oversee real-time network activities by analyzing data and files to detect unauthorized communication attempts, illicit connections, anomalous or malicious credential usage, brute force login attempts, atypical data movement, and data exfiltration. This allows organizations to gain statistical insights and protect against anomalies before their reporting and correction.

AI improves network monitoring and threat detection tools for smart security by reducing noise, providing prioritized alarms, using contextual data supported by evidence, and performing automated analysis based on correlation indices from cyber threat intelligence.

On-premises systems, cloud computing, and edge computing have made the total IT perimeter for many organizations and institutions more complex and dispersed. This requires improved threat detection, analysis, and incident response, as well as increased visibility. This is the most critical component of smart cybersecurity. Smart cybersecurity can detect, filter, neutralize, and remediate cyber threats. Additionally, predictive and generative AI algorithms may apply predictive models more effectively in cybersecurity, resulting in improved security data and results.

AI solutions for threat intelligence and network monitoring may assist in improving cybersecurity. Generative AI (GenAI) may be able to deploy predictive models in cybersecurity in a more effective manner, yielding better outcomes and more reliable security data. AI agents and GenAI might collaborate to identify strategies to decrease risk while also improving cybersecurity knowledge and incident response for corporations and organizations. Generative AI can swiftly extract important information, best practices, and recommended actions from the security industry's corpus of knowledge.

Agentic AI-enabled cybersecurity offers enormous promise for detecting, preventing, halting, and resolving cyberthreats. Agentic AI can assist with the primary issues of threat detection, response time, and analyst burden. These technologies automate duties while still allowing for human oversight, making security teams more effective in an increasingly perilous digital environment.

While AI and ML are crucial tools for cyber defense, they may also provide asymmetrical tools for adversarial hackers. While they may be used to rapidly identify hazardous abnormalities and enhance cybersecurity measures, threat actors may also exploit them. Adversarial nations and nefarious hackers are now using AI and MI to discern and exploit vulnerabilities in threat-detecting frameworks. They use several techniques to do this. Their favored techniques often include automated phishing schemes that replicate human actions, with malware that autonomously alters itself to mislead or compromise cybersecurity frameworks and applications.

Cybercriminals are now using AI and machine learning technologies to penetrate and analyze victims’ networks. According to research issued Thursday by cybersecurity firm Team8, one in every four CISOs has encountered an AI-generated attack on their company’s network in the last year, and AI threats are now at the top of their priority lists. According to Team8, the real number of firms attacked by AI-powered assaults "may be even higher," since most AI-driven threats imitate human behavior and are difficult to identify without sophisticated metrics such as time to exploitation and velocity indicators. AI, Risk, and the Road Ahead: Key Findings from the 2025 CISO Village Survey - Team8

A 2025 IBM/Ponemon Institute research study found that one out of every six breaches involved AI-driven attacks. Attackers are using generative AI to perfect and scale their phishing campaigns and other social engineering attacks. IBM: Cost of U.S. data breach reaches all-time high and shadow AI isn't helping | Network World

Small firms, organizations that lack the in-house expertise, and the financial resources for significant investments in sophisticated cybersecurity mitigation technologies are the most vulnerable.

Cybercriminals are using artificial intelligence technology to automate their attacks by accessing and analyzing victim networks. Their favorite strategies for deceiving or undermining cyber-defense systems and applications include self-modifying malware and automated phishing efforts. As a result, their focused attacks are more deadly, planned, and quick.

Cybercriminals regularly use business email compromise (BEC) fraud schemes to defraud victims by impersonating a legitimate person or company. Hackers may use generative AI to create emails that closely resemble the language, style, and tone of the person or organization they are impersonating, confounding the difference between false and real communications. They can deploy AI tools that can even spoof a person with fake videos and voice mimicking.

The most effective approaches for preventing and detecting spoofs and hacks entail always being vigilant. Avoid clicking on links in emails or websites without first checking the sender’s identity. Install antivirus and AI-enabled spoof detection software and consider using packet filtering capabilities provided by multiple manufacturers. In addition, with AI-enabled attacks expanding, Zero Trust identity-centric security is important for recognizing identity access and management as the point of greatest marginal risk reduction.

Clearly, AI is a transformative force in cybersecurity, offering both immense opportunities and significant risks. To succeed in this changing environment, organizations must take a comprehensive approach that combines advanced AI security tools with strong basic cybersecurity practices, focuses on proactive defense methods, and continuously adjust to new threats.

Quantum Computing’s Emerging Capabilities and Threats

Quantum computing works by harnessing the distinctive properties of atoms and subatomic particles. Physicists are creating quantum computers with exceptional computing speeds, enabling a new kind of analytics and cryptography. There are estimates that organizations are en route toward building commercially viable, fault-tolerant quantum computers within the decade.

Quantum computing is becoming more viable as technology advances, making it easier to develop and more efficient at scaling. The gate model and quantum annealing are the two most used quantum computing strategies. Workable quantum solutions based on annealing systems are now widely used. And gate models may appear much sooner than expected.

READ MORE on Cognitive World on Forbes.


Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named as “Cybersecurity Person of the Year by Cyber Express, as one of the world’s “10 Best Cyber Security and Technology Experts” by Best Rated, as a “Top 50 Global Influencer in Risk, Compliance,” by Thompson Reuters, “Best of The Word in Security” by CISO Platform, and by IFSEC and by Thinkers 360 as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 and 2021 Onalytica "Who's Who in Cybersecurity" – as one of the top Influencers for cybersecurity issues and in Risk management. He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic. He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to FORBES. 

In government, Chuck has received two senior Presidential appointments. Under President George W. Bush Chuck was appointed to The Department of Homeland Security (DHS) as the first Legislative Director of The Science & Technology Directorate at the Department of Homeland Security. He also was appointed as Special Assistant to the Director of Voice of America under President Reagan. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering security and technology issues on Capitol Hill. Currently Chuck is serving DHS CISA on a working group exploring space and satellite cybersecurity. 

In industry, Chuck has served in senior executive roles for General Dynamics as the Principal Market Growth Strategist for Cyber Systems, at Xerox as Vice President & Client Executive for Homeland Security, for Rapiscan and Vice President of R & D, for SRA as Vice President of Government Relations, and for Sutherland as Vice President of Marketing and Government Relations. He currently sits on several corporate and not-for-profit Boards in advisory roles. 

In academia, Chuck is Adjunct Faculty at Georgetown University’s Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity.  He designed and taught a popular course called “Disruptive Technologies and Organizational Management.”  He was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years.   He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law. 

In the media, Chuck has been a featured speaker at dozens of conferences, events, podcasts, and webinars and has published more than 250 articles and blogs on cybersecurity, homeland security and technology issues. Recently, Chuck briefed the G-20 Energy Conference on operating systems cybersecurity. He has also presented on the need for global cooperation in cybersecurity to the Holy See and the US Embassy to the Holy See in Rome.   His writings have appeared on AT&T, IBM, Intel, Microsoft, General Dynamics, Xerox, Juniper Networks, NetScout, Human, Beyond Trust, Cylance, Ivanti, Checkpoint, and many other blogs. He has 104,000 plus followers on LinkedIn and runs a dozen LI groups, including the two largest in homeland security. He has his own newsletter, Security & Tech Trends, which has 48,000 subscribers. He also has a wide following on Twitter (19,000 plus followers), and Facebook (5,000 friends). 

Some of Chuck’s other activities include being a Subject Matter Expert to The Homeland Defense and Security Information Analysis Center (HDIAC), a Department of Defense (DoD) sponsored organization through the Defense Technical Information Center (DTIC), as a featured presenter at USTRANSCOM on cybersecurity threats to transportation, as a featured presenter to the FBI and the National Academy of Sciences on Life Sciences Cybersecurity. He also served on working group with the National Academy of Sciences on digital transformation for the United States Air Force He is an Advisory Board Member for the Quantum Security Alliance. Follow Chuck on social media: LinkedIn: https://www.linkedin.com/in/chuckbrooks/ and Twitter:  @ChuckDBrooks