Cybersecurity

Fifth-generation cyberattacks are here. How can the IT industry adapt?

Most businesses' security procedures remain second- or third-generation. Image: Getty Images/iStockphoto

Itai Greenberg
Vice-President, Product Management, Check Point
Share:
Our Impact
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

Cybersecurity

Have you read?

Healthcare sector cyberattacks in 2020
Healthcare sector cyberattacks in 2020 Image: Check Point

Attacks targetting remote connection vulnerabilities
Attacks targetting remote connection vulnerabilities Image: Check Point

Discover

What is the Forum doing to avert a cyber pandemic?

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Related topics:
CybersecurityCybercrimeFourth Industrial Revolution
Share:
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

The US launches National Cybersecurity Strategy and other  cybersecurity news to know this month

Akshay Joshi

March 22, 2023

About Us

Events

Media

Partners & Members

  • Join us

Language Editions

Privacy Policy & Terms of Service

© 2023 World Economic Forum