There are many articles offering surveys of the cybersecurity landscape. One of the better ones I've seen in recent weeks would be this one. TechJournal.org proposes ten areas to watch. This article surfaced in January of this year and I can't see it as having been disproven yet. Here's a simplified, skeletal restatement of TechJournal's longer investigations of these subjects:
1. Cyber Deception Technologies
You've heard of honeypots and honeynets? Decoy construction is improving as machine learning and AI are being introduced here.
2. Homomorphic Encryption for Secure Data Processing
Suppose data that's encrypted could also be processed in that state, without decryption? It's becoming practical - hopefully without occurring within insecure applications...
3. Behavioral Biometrics In Authentication
Suppose an authentication system could take into account your finger swipe tendencies, or your keyboarding speed? They could be grouped with a passphrase for greater security - assuming the form of storage of those biometrics was also secure.
4. Secure AI Development Frameworks
Since writing AI applications is best done securely, why not use AI-enabled code review programs?
5. Advances In Threat Intelligence Sharing
Using blockchain to create communications channels between defense agents could increase the integrity of intelligence by many multiples.
6. Cybersecurity For Space Systems
From missile targeting and battlefield situational awareness to weather forecasting and logistics tracking, satellite groups are being deployed in increasing numbers. The operation of these units requires continuing improvements in burst approaches, compression/expansion and cryptology.
7. Securing The Internet Of Things
How likely is it that a $20 webcam will be provided with timely updates, updates at all or even an updater at all?
8. Quantum-Resistant Cryptography
Algorithmic resistance to the evident power of quantum computing is becoming a reality, and not a moment too soon.
9. Enhanced Email Encryption Solutions
Certificate strategies and key generation methods need to be constantly improved in order to preserve the practicality of this oldest of computer communication forms.
10. Zero Trust Architecture
Begin device connection with the assumption of compromise.