Cybersecurity is the overall protection of networks, and security behind digital attacks. With the constant advancement and evolution within technology, cybersecurity is continually growing and constantly being demanded within organizations. There are many security threats within our digital age. As well as attackers continually finding more ways or methods to hack into networking or exploit information/systems. To put into perspective many individuals or organizations use a mobile device, cloud storage service, or leave a digital footprint. Without proper security being maintained with each mobile device, cloud storage service, or digital application, everyone’s information withheld could be compromised or exposed publicly.

Currently in 2020 many organizations are utilizing cloud computing. According to, “In all, cloud computing hardware, software and services are capturing 60% of all IT market growth.”. Cloud computing itself causes major security concerns. With improper security behind the accessibility of the cloud computing services offered many things could go wrong. According to, some of these threats are, “Consumers Have Reduced Visibility and Control.”, “On-Demand Self Service Simplifies Unauthorized Use.”, “Internet-Accessible Management APIs can be Compromised.”, “Separation Among Multiple Tenants Fails.”, and “Data Deletion is incomplete”. With everything listed, security behind cloud computing is a serious matter. Cybersecurity professionals must keep up to date with current, or future vulnerabilities, proper physical security behind the servers, and overall make sure everything running smoothly.

Cloud computing is not the only technology innovation revolutionizing cybersecurity. To be blunt, there are new innovations everyday and too many to list that change the cybersecurity industry behind the computers, applications or even appliances. There are also future innovations that cybersecurity professionals must analyze and prepare for. One of these and probably the most important will be the advancement of quantum computing. According to, “Quantum computers leverage quantum mechanical phenomena to manipulate information. To do this, they rely on quantum bits, or qubits.”. This would change the cybersecurity industry majorly, especially if quantum supremacy is to be achieved. Quantum supremacy is when a quantum processor can exponentially outperform a normal processor at specific tasks. If true quantum supremacy is to be achieved, it would rapidly alter cybersecurity. Many methods and tools regarding security would require change—specifically, encryption methods. With the encryption tools and methods we use today, a true quantum computer would break encryption within seconds compared to days or years it would take a normal computer.

With all this being said there are also a upside to the new innovations and technological achievements being discovered/identified. Each innovation, security threat, or overall bug being discovered, allows for more security to be implemented and strengthens our digital ideologies. To conclude, cybersecurity as a career or industry will constantly be sought after by organizations or even by certain individuals wishing to secure their home network or digital footprint.


12 Risks, Threats, & Vulnerabilities in Moving to the Cloud. (2018, March 5). Software Engineering Institute.

Fisher, C. (n.d.). IBM | What is Quantum Computing?IBM Quantum.

The Evolution of Cloud Computing – Where’s It Going Next? (2018, December 19). The Cloud Report | News, Articles, Interviews and Tests.,of%20all%20IT%20market%20growth.