Fifth-generation cyberattacks are here. How can the IT industry adapt?

Most businesses' security procedures remain second- or third-generation. Image: Getty Images/iStockphoto

Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:
Cybersecurity


What is the Forum doing to avert a cyber pandemic?
Don't miss any update on this topic
Create a free account and access your personalized content collection with our latest publications and analyses.
License and Republishing
World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.
The views expressed in this article are those of the author alone and not the World Economic Forum.
Related topics:
The Agenda Weekly
A weekly update of the most important issues driving the global agenda
You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.
More on CybersecuritySee all
Akshay Joshi
March 22, 2023
Minos Bantourakis and Marija Manojlovic
March 22, 2023
Anna Sarnek
March 21, 2023
March 15, 2023
Akshay Joshi and Daniel Dobrygowski
March 9, 2023
Tobias Adrian and Caio Ferreira
March 8, 2023