How engineering security into next-generation computing could enable a bold expansion of cyberspace

Security should be embedded in next-generation computing from the very beginning to prevent attacks and disruptions. Image: Getty Images/JianFan
- Next-generation computing will harness quantum mechanics and more to achieve unprecedented power, ubiquity and speed.
- However, it will also be vulnerable to attack, manipulation and disruption unless security is embedded from the beginning.
- Building cybersecurity into engineering and deployment processes doesn’t have to compromise capability but it will require collaboration.
For many years, a “next-generation computer” really meant a faster machine. Those new computers did the same things and calculated in the same way as previous machines, only at higher speeds and with more storage.
Today, next-generation computing means something else entirely. It means different types of machines and computation methods, with unprecedented power, ubiquity and speed. And it encompasses far more than artificial intelligence (AI).
It includes harnessing the power of quantum mechanics to make devices that can process data in fundamentally different ways, with bits that are able to simultaneously embody two distinguishable states, not just on or off. It means mimicking the structure and functionality of the human brain to create neuromorphic computers and using biological molecules to carry out computations. It also means putting computers into space and taking advantage of that environment
Next-generation computing will expand what we call cyberspace in dramatic ways and enable entirely new online activities.
It will also be highly vulnerable to attack, manipulation and disruption, however, unless security is built into these systems from the beginning. This will require consumers, companies and countries to work together to shape development and deployment.
Embedding security
As with previous generations of computing, the next generation has the potential to create enormous benefits. But these machines could also become both targets and tools for malicious actors if they are not built correctly.
Computing is everywhere – in every device, transaction and orbit. With such pervasive power and dependency, the world can no longer rely on playing catch-up by patching each new threat as it emerges. Instead, market forces must deliver a strong, adaptive cyber-immune system.
Security should be embedded in next-generation computing from the outset to prevent bad actors from attacking or disrupting these systems to cause harm. At the same time, these new tools should also be used to make existing cyber defences more effective.
Failure could mean that next-generation computers end up causing significant harm – maybe even more harm than good. But success will create resilience and the ability to confidently harness these technologies to drive productivity and social value, even as adversaries also evolve.
Indeed, the history of computing shows that malicious actors will eventually find a way to use new technologies for harmful goals.
The classic example is the concern that quantum computing will enable cyberattackers to crack existing asymmetric cryptography easily, leaving almost every transaction on the internet vulnerable. Neuromorphic computers will excel at pattern recognition, enabling adversaries to more easily identify potential vulnerabilities in software code or misconfigurations in networks.
So, as we deploy these tools, we must factor in the reality that malicious actors will seek to weaponize them and find ways to make such misuse harder to achieve.
Resilience by design
Every system has flaws, but proper design and engineering can reduce the number of vulnerabilities in these systems. This makes them more resilient to threats. If next-generation computers are deployed without factoring in cybersecurity, however, the same mistakes made at the dawn of the internet age will be repeated. In other words, these systems will be fundamentally insecure and may never catch up if security is simply added later.
Building security into these systems does not mean compromising capability, or even dramatically slowing deployment. It means building cybersecurity into engineering and deployment processes.
The technology could provide defence advantages as well. Quantum networks will improve the ability to protect communication links against powerful eavesdroppers. Neuromorphic computing could be used to find vulnerabilities in new code before it is deployed or to scan networks for misconfigurations before bad actors find them.
Biological computing opens avenues for novel encryption tools or massive parallel processing at much lower energy costs. The cybersecurity industry should already be thinking about how to employ these new technologies.
Shaping a secure computational frontier
The changes wrought by the internet and the first few generations of computing have been massive. Advances in AI have accelerated those changes. Many of the resulting developments have been positive, fuelling economic growth and human connection.
But, unfortunately, those positive attributes have been accompanied by a dark side – an explosion of cybercrime and disruption. AI is already starting to empower malicious actors. If next-generation computing is to avoid the same fate, cybersecurity must be built into its DNA.
This will involve more than just technology. Whether deliberately or accidentally, governments have structured markets to favour speed over other factors such as environmental considerations or security concerns. As a result, companies are often incentivized to deploy technology with known security flaws or risk a loss of competitive edge.
Changing market structures to incentivize companies to factor in other important sources of value, such as cybersecurity or public safety, will require co-operation from many different countries, not just one or two. And consumers need to build these considerations into their procurement decisions too. This will generate a demand signal for safety and security in next-generation computing products.
If societies can align these incentives properly, they will enjoy the benefits of next-generation computing while also minimizing its costs. And this could mean that next-generation computing becomes humanity’s strongest shield rather than its greatest vulnerability.
Don't miss any update on this topic
Create a free account and access your personalized content collection with our latest publications and analyses.
License and Republishing
World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.
The views expressed in this article are those of the author alone and not the World Economic Forum.
Stay up to date:
Cybersecurity
Forum Stories newsletter
Bringing you weekly curated insights and analysis on the global issues that matter.







