Man seeing through binoculars showing cyber security landscape in 2020 and beyond
A Look at Cybersecurity in 2020 and Beyond by Jerry Vasquez, Product Manager at Liquid Web

A Look at Cybersecurity in 2020 and Beyond

No one can deny the rate at which technology is advancing. Add to that the rapid pace of market changes and you have the perfect storm of cybersecurity concerns. In 2019, organizations saw their fair share, including data breaches and ransomware. These trends are expected to continue into 2020, causing shifts in innovation and overall security.

Cybersecurity is a business-critical discipline that spans a broad range. As bad actors become more sophisticated, organizations must step up the degree and coordination of their efforts. Unfortunately, many organizations continue to use disconnected point tools, manual efforts, and legacy systems that simply cannot scale.

So what can organizations expect in the next year? Here are our predictions for cybersecurity in 2020 and beyond.

Cybersecurity with cloud-based central management

Cybersecurity technology will shift toward a centralized, cloud-based management plane that houses many different security services under one roof. From this cloud-based management plane, organizations will have the ability to gain insights and shepherd policy management, configuration management, monitoring, and more.

The execution and enforcement of security controls can be distributed to cover on-premises, in the cloud, at the network edge, and wherever it’s needed. It will essentially be a sophisticated ballet between the “brains” of the operation (the cloud-based security technology) and its “hands”—the hardware and software-based security controls that can be enacted as needed.

Automation rules

The automation of more granular security operations will allow security teams to focus on high priority items and strategies to best protect business assets. Security policy automation will be a part of this, created based on users, network flows, and other essential information. Multi-factor authentication will be a must-have in addition to enforcing privilege relationships, enabling only specific users to gain access and decreasing the attack surface.

A cloud-based management plane will provide insights and shepherd policy management, configuration management, monitoring, and more. #respectdataClick to Tweet

Vulnerability management solutions can be set up to automatically detect and scan devices on an enterprise network. After a scan, these tools can run an assessment against the set of security controls authorized by the organization. Any defects can be fixed based on the final assessment. Robotic process automation (RPA) tools will enable the automation of a whole slew of cybersecurity tasks, especially as custom-developed software and code are leveraged to address specific challenges or vulnerabilities.

Powerful cybersecurity technology platforms

There will be a movement away from point tools and toward cybersecurity platforms with multiple components. These components will likely consist of network security, threat intelligence, file detonation sandboxes, endpoint/cloud workload security, and advanced analytics. The status quo of attempting to piecemeal disparate tools will end as organizations seek out a single source of cybersecurity truth and likely move to a single vendor for all cybersecurity needs.


The complexity of cybersecurity issues will only evolve in 2020. Enterprises will need to invest in the right mix of security automation tools and employ the correct techniques. More importantly, organizations should ensure that they are working with vendors and partners that have a strong record in cybersecurity. This includes software and hardware vendors all the way up to managed hosting providers. As an organization grows and expands, its cybersecurity roadmap should too.