Temitope Olayinka, Oluwakemi (2025) Built for Speed, Breached by Threats: The Cybersecurity Dilemma of Digital Transformation. International Journal of Innovative Science and Research Technology, 10 (4): 25apr984. pp. 1963-1967. ISSN 2456-2165

[thumbnail of IJISRT25APR984.pdf] Text
IJISRT25APR984.pdf - Published Version

Download (538kB)

Abstract

“Speed is the new scale,” declared Accenture in its 2022 State of Cybersecurity Report—and in the era of digital transformation, that sentiment has become gospel. Organizations worldwide are racing to deploy cloud infrastructure, integrate IoT devices, roll out AI-powered systems, and enable remote access at scale. According to Gartner, over 91% of enterprises have already embarked on digital initiatives, with nearly 70% accelerating timelines post-pandemic (Gartner, 2022). But in this gold rush for agility and efficiency, cybersecurity often lags underfunded, underprioritized, or retrofitted only after a breach occurs. “You can’t bolt on security at 100 miles per hour,” warns Theresa Payton, former White House CIO. As systems scale, so too do the attack surfaces: misconfigured cloud environments, exposed APIs, and under secured endpoints become low-hanging fruit for cybercriminals. In essence, the very architecture built for speed has become riddled with doors left ajar. This article dives into the growing paradox at the core of transformation: how speed, when not tempered with security, becomes a threat multiplier. We’ll unpack landmark breaches like the SolarWinds attack, which compromised over 18,000 organizations through a single software update (CISA, 2021), and the Colonial Pipeline ransomware strike, where an unprotected VPN credential halted fuel supply to the U.S. East Coast (FBI, 2021). During the height of COVID-19, healthcare systems rushed to adopt telemedicine—only to see a 45% surge in ransomware attacks in the sector globally (Check Point, 2021). These aren’t isolated incidents—they’re symptoms of a global misalignment between digital ambition and cybersecurity discipline. But transformation doesn’t have to mean exposure. This piece offers a forward-looking blueprint to help leaders strike the right balance—building systems that are not only fast but also fortified.

Item Type: Article
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science
Depositing User: Editor IJISRT Publication
Date Deposited: 02 May 2025 11:26
Last Modified: 02 May 2025 11:26
URI: https://eprint.ijisrt.org/id/eprint/678

Actions (login required)

View Item
View Item