Technology

When prevention fails: the case for building cyber resilience, not walls

2025-11-24 15:19
378 views
When prevention fails: the case for building cyber resilience, not walls

For years, cybersecurity strategy has been defined by a “fortress” mentality – but today’s attack surface is borderless.

  1. Pro
When prevention fails: the case for building cyber resilience, not walls Opinion By Jason Daniels published 24 November 2025

The case for building cyber resilience

Comments (0) ()

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Closing the cybersecurity skills gap (Image credit: Shutterstock)

For years, cybersecurity strategy has been defined by a “fortress” mentality – building taller walls and deeper moats to keep intruders out.

But today’s attack surface is borderless. Hybrid cloud, remote work, third-party ecosystems, and AI-driven automation have erased the fixed perimeter.

  • Amazon Black Friday deals are live: here are our picks!

Prevention still matters, but it’s no longer enough. Breaches are inevitable, and resilience – the ability to withstand, recover and adapt – has become the new frontline.

You may like
  • Cloud, networking and internet From resilience to antifragility: embracing a new era in cybersecurity
  • An abstract image of digital security. Building a security-first framework against evolving cyberthreats
  • Security padlock and circuit board to protect data Building cyber resilience through design and disclosure
Jason Daniels

Chief Digital Officer at Fujitsu.

A prevention-only mindset breeds false confidence. Modern resilience assumes compromise will happen and focuses on continuous monitoring, threat intelligence, and AI analytics that detect abnormal behavior in real time.

It’s the shift from if to when, and being ready to respond with speed, precision, and confidence.

What resilience looks like in practice

True cyber-resilience isn’t just about security, it’s about continuity. Resilient organizations weave protection into every layer of their operations. That starts with building security into DevOps pipelines from day one, so safeguards evolve alongside innovation.

It means using automation and AI to detect threats, but also to orchestrate instant responses and contain breaches before they spread.

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

It also demands real-time data replication and immutable backups that allow critical services to be restored within minutes, not days. And just as importantly, it involves continuous rehearsal through cyber-simulations that test how people, processes, and technology respond under pressure.

When this foundation is in place, intrusions can be detected, assets isolated, and operations restored, often before customers even notice.

Minimizing disruption when attacks happen

Preparedness and automation are key. AI-driven orchestration tools can now isolate compromised endpoints, trigger data restoration, and alert stakeholders automatically. A data-centric recovery model, underpinned by secure, immutable backups, drastically reduces downtime.

You may like
  • Cloud, networking and internet From resilience to antifragility: embracing a new era in cybersecurity
  • An abstract image of digital security. Building a security-first framework against evolving cyberthreats
  • Security padlock and circuit board to protect data Building cyber resilience through design and disclosure

But technology alone isn’t enough: clear response governance, predefined communication channels, and tight coordination between IT, operations, and legal functions are what keep the business moving and customers informed.

As AI becomes both a weapon and a defence tool, the speed of response will define the next generation of cyber resilience. Threat actors are already using generative AI to craft more sophisticated phishing campaigns, automate exploits, and overwhelm defenders with volume.

The only way to match that scale is through AI-driven defense; automation that analyses anomalies, prioritizes alerts, and executes playbooks in seconds.

At the same time, regulatory expectations are shifting. Frameworks like the UK’s Network and Information Systems (NIS2) directive and the upcoming EU Cyber Resilience Act are pushing organizations to prove that they can protect data, and that they can recover quickly and transparently when breaches occur.

Compliance, in this sense, becomes a resilience accelerator, encouraging businesses to hardwire adaptability,

Leadership defines resilience. It cannot sit solely with the security team; it must be a company-wide discipline. Every employee, from boardroom to front line, plays a role through awareness, secure behaviors, and accountability.

Embedding resilience into KPIs, training, and leadership narratives transforms cybersecurity from a reactive necessity into a cultural strength.

Resilience as a competitive advantage

Trust is the new currency of the digital economy. Organizations are judged less by whether they suffer incidents and more by how they respond. Those that maintain service continuity, protect data integrity, and communicate transparently earn lasting confidence from customers and regulators alike.

Resilience is also a growth enabler. It allows faster innovation, safer AI adoption, and preparation for the next disruption, including the looming quantum threat, which could upend current encryption standards. Forward-looking businesses are already exploring quantum-safe cryptography to safeguard the trust they’ve built.

We've featured the best business VPN.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

TOPICS AI Jason DanielsSocial Links Navigation

Chief Digital Officer at Fujitsu.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more Cloud, networking and internet From resilience to antifragility: embracing a new era in cybersecurity    An abstract image of digital security. Building a security-first framework against evolving cyberthreats    Security padlock and circuit board to protect data Building cyber resilience through design and disclosure    World Password Day 2025 I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech    Representational image depecting cybersecurity protection Protecting productivity: the imperative of cybersecurity in manufacturing    Security padlock and circuit board to protect data The resilient retailer’s guide to proactive cyber defense    Latest in Pro NordLocker NordLocker is one of the most trusted security platforms out there - and its cloud storage offering has some great Black Friday deals    Hostinger Black Friday banner Hostinger just got even cheaper - get 88% off with this Black Friday deal, exclusive to TechRadar    Man wearing VR headset in a digital world Unveiling MPEG-I: The next generation of VR and AR audio    LiTime X Mini battery header image LiTime X Mini battery and accessories review    airplane Iberia tells customers it was hit by a major security breach    Sustainability Many companies want to do more on sustainability - but just don't have the support or budget to do so    Latest in Opinion Closing the cybersecurity skills gap When prevention fails: the case for building cyber resilience, not walls    Elon Musk at the 2025 U.S.-Saudi Investment Forum Elon Musk on the future of jobs and AI, 'My prediction is that work will be optional'    internet connectivity A glimpse into the next decade of connectivity: 4 lessons from Yotta 2025    Representational image depecting cybersecurity protection Protecting productivity: the imperative of cybersecurity in manufacturing    Concept art representing cybersecurity principles Human risk: don’t blame the victim, fix the system    data What is data governance and why is it crucial for successful AI projects?    LATEST ARTICLES