Devs are constantly challenged to stay ahead of the game particularly when it comes to protecting security. What’s your prediction for the next big idea in encryption tech we asked our panelists?

The eleven best answers are below:


1. Hardware-based whole disk Encryption

Hardware-based disk encryption will continue to grow and bypass whole disk encryption software products. With this type of encryption, after a key has been delivered, the entire contents of a volume encrypts it after it is used. This doesn’t protect against network attacks via emails or sites, but it does protect data when a laptop or device is lost or stolen and a key is required to decrypt it. – Blair Thomas, eMerchantBroker

2. Homomorphic Encryption

Right now we encrypt data as it travels over the internet and when it is at rest on a storage device. However we have to decrypt data to use or analyze it, creating a potential security vulnerability. Homomorphic encryption is a new idea that solves that problem, allowing users to process data without decrypting it. With homomorphic encryption, we process encrypted data and produce encrypted results. – Vik Patel,

3. Moving Target Defense

The biggest problem we face with data security is not whether or not data is encrypted, it’s if we use the same code as the attackers. The next big idea in security is moving target defense. The idea is simple enough: constantly change the attack surface so the bad guys can’t spend time reverse engineering the environment. A crafted attack only works when you know what you’re attacking. – Andrew Vest, Redapt

4. Wearable Two-factor Authentication

Passwords are indeed important however so is the ease of use and functionality. Large cryptographically generated passwords are more powerful than typical use-and-remember passwords. Having wearable devices that will connect and convey this type of information can be very powerful and eliminate the challenges of multiple passwords. – Nicole Munoz

5. Physical-based Security

Encryption will be changing a lot in the future. It may be blockchain-based, quantum-computer-based, or something else altogether. We will likely see a resurgence of keeping private or personal info off of our computers completely. This is happening today with the use of hardware wallets for cryptocurrencies, and this trend will grow with the volatility of new encryption technologies. – Alexander Mistakidis, Gamelynx

6. Quantum Cryptography

This is the only proven method for transmitting a secret key or password over a distance. It functions by using photons of light to physically move a shared file between two parties. These photons might be intercepted by another technology, however they can’t be cloned or copied. – Michael HsuDeepSky

7. Smart contracts for encrypted payments

It’s not a matter of if, but when blockchain technology will become the standard for secure, encrypted transactions. Have you ever sent money through Western Union? It’s the equivalent of talking to a stranger in a 12-seat passenger van, except that you’re the one giving them the candy. Super sketchy. Unreliable. Risky. Cryptocurrency will quickly usurp Western Union and other mediums like it. – Sara Rose HarcusHüify

8. Honey encryption

Honey encryption is another level of security that helps deter potential data thieves. The way it works is by letting the hackers think they guessed correctly by making it look like the info provided is accurate, but it isn’t. – Chris Christoff,

9. Voice Biometrics & Facial Recognition 

Enhanced voice biometric authentication and facial recognition are going to become important parts of securely identifying people when they want to access sensitive info. Asking for mother’s maiden name or pin code is no longer sufficient. – Samuel Thimothy, OneIMS

10. Blockchain

Blockchain technology, the same technology used to secure cryptocurrencies such as bitcoin has the potential to become a staunch ally against cyber threats. Blockchain technology, when applied to cybersecurity models, turns on all the lights, increases target fungibility and makes it virtually impossible to fake identification.  – Robert J Choi, RJC & Company

11. Tokenization

Tokenization is the principle of substituting an actual piece of data for pseudo data with a ‘token.’ The founding principle of data security is that if you do not want your data stolen, don’t give it out to anyone. With tokenization tech we could see a world without payment fraud as merchants are no longer storing consumer payment data. – Zohar Steinberg

Olé Crypto,

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.