Resilience Is The New Priority In A World Of Emerging Digital Threats
Image: Depositphotos enhanced by ChatGPT
Digital infrastructure serves as the foundation for national security, the economy, and everyday life in today’s hyper-connected world. Artificial intelligence (AI) and quantum computing are examples of emerging technologies that inspire creativity. However, these technologies also magnify risks posed by sophisticated attacks, black swans, gray swans, economic volatility, and geopolitical tensions. At this point, resilience—the ability to anticipate, endure, and recover from disruptions—is absolutely necessary.
The coming together of different technologies creates both chances and risks.
Real-time risk analysis and supply chain optimization are two examples of the strong capabilities that may be achieved through the combination of artificial intelligence, quantum computing, fifth-generation wireless networks, and the internet of things. However, this combination significantly expands the attack surface. In electricity grids, unpatched Internet of Things sensors have the potential to act as entry points for artificial intelligence-amplified malware, which could result in cascading failures. Older operational technology (OT) systems are now easier targets for advanced cyber-physical attacks because they are no longer connected. This means that integrated cybersecurity is an important part of both national and organizational safety.
Dual-Use Powerhouse: Artificial Intelligence
Although artificial intelligence (AI) strengthens security by means of predictive analytics and automated threat detection, it also gives attackers more capability. Deepfakes are used by adversaries in disinformation campaigns (for example, fake videos of political candidates promoting fraudulent investment schemes during elections in Romania and Czechia in 2025 Deepfake Scam Exploits Romanian Presidential Candidates to Lure Victims into Fake ‘Neptun Deep’ Investment), adaptive malware that evades detection in real time, and highly personalized phishing emails that mimic human behavior.
Adversaries exploit these capabilities. At the same time that ransomware groups have employed artificial intelligence to develop polymorphic malware loaders, AI-driven attacks in the financial sector quickly target hybrid networks. In order to maintain a competitive advantage, resilience necessitates articulated artificial intelligence, robust governance frameworks, automated incident response, and public-private partnership.
A Threat to Encryption Presented by Quantum Computing
However, quantum advancements pose a threat to the current encryption system by means of Shor’s algorithm, which would allow for the "Q-Day" decryption of archived sensitive data in the areas of defense, banking, and government. Quantum improvements promise to make significant progress in drug discovery and materials science. When it comes to surveillance and secure communications, nation-states have the potential to asymmetrically acquire benefits.
Starting to use post-quantum cryptography now, like the NIST-approved algorithms ML-KEM and ML-DSA, which are already being widely used (for instance, over half of the traffic initiated by people on Cloudflare will use post-quantum encryption by the end of 2025, according to the State of the post-quantum Internet in 2025), is a crucial step in getting ready. Hybrid encryption and resilient designs transform quantum computing from a potential threat into a defensive advantage.
The Transformation of Black Swans and Gray Swans from Unpredictable to Predictable
Black Swan events, like the SolarWinds supply chain breach and the Colonial Pipeline ransomware attack, show how unexpected shocks can spread through connected networks, leading to significant economic and operational damage.
Gray Swans are risks that can be anticipated, like weaknesses in old systems, threats to power grids from electromagnetic pulses (EMP), and new dangers from AI, such as automated hacking of large language models or AI systems that ignore safety measures. Despite their predictability, people often overlook gray swans. To keep innovation from becoming a liability, adaptive resilience requires careful scenario planning, regular stress testing, and proactive attention.
Chuck Brooks
Chuck Brooks has been a leading evangelist for cybersecurity in both the public and private sectors. He has been a featured speaker at numerous events and conferences, and has written dozens of articles on cyber tech and policy in publications such as Forbes, Huffington Post, The Hill, Federal Times, IT Security Planet, Bizcatalyst360, NextGov, Alien Vault, Gov Tech, Government Security News and many others. Chuck is a pioneer in social media with a global following and has brought significant attention to cyber issues from his frequent posts and commentary on LinkedIn, Twitter, Facebook, FedScoop, and other social media. He also owns and operates several high-profile groups on LinkedIn active in cybersecurity and homeland security discussions. He is one of the original “plank holders” at the Department of Homeland Security, worked on Capitol Hill, taught homeland security at Johns Hopkins University, and has advised several organizations including the Bill & Melinda Gates Foundation, The Cyber Resilience Institute, and is a member of the AFCEA Cybersecurity Committee. He also serves as Chairman of CompTIA’s New and Emerging Technologies Committee, and as a Christian Science Monitor Passcode Influencers Panel member on Information Security. He is on the Board of Advisors for CyberTech, on the Board of Directors at Bravatek, and on the Cyber Resilience Institute. He is an advisor to Inzero Systems and The Center for Advancing Innovation. He has a BA from DePauw University and an MA from the University of Chicago and has a Certificate in International Law from The Hague Academy of International Law, Netherlands.
Chuck's thought leadership activities and writings on cybersecurity have helped shape the public policy debate as he is respected in the industry, in the Federal Government, in academia, in global communities, and on Capitol Hill. He has been a force in discussing, advocating, and promoting cybersecurity issues across digital media, at events, in professional forums, and with a variety of public policy organizations. Chuck has authored numerous articles focusing on cybersecurity, homeland security, and technology innovation for many publications, print, and digital.