Cyber threats are evolving everywhere – and "prevention alone is insufficient," says NordVPN CTO

NordVPN CTO Marijus Briedis speaking at a panel during RightsCon 2025 in Taipei, Taiwan, on February 25.
(Image credit: Future)

The evolution of cybercrime isn't ending anytime soon, sorry.

Massive data breaches, AI, and increased target refinement across media outlets, governments, and businesses are all contributing to this change. But, as NordVPN CTO Marijus Briedis said at Rightscon 25, "Prevention alone is insufficient. What you need is resilience".

NordVPN, provider of one of the best VPNs, had first-hand experience of the evolving cyber threat landscape following the surge in cybercrime incidents targeting Lithuania, where it's based, in the wake of the Ukraine conflict.

The need for cyber resilience

As Briedis explained, the last few years have seen nation-state hackers and cyber criminal gangs expanding and exploiting any digital vulnerabilities.

Worse still, "with little resources you can have a lot of damage," he added.

In 2024, data breaches reached an all-time high. Take the "mother of all data breaches" kicking off the year with 26 billion records leaked. In total, over 1 billion records were exposed throughout the year, as per NordLayer data.

Ransomware, phishing, and malware also remain a big threat during the year, with cybercriminals increasingly using AI to craft better attacks.

Generative AI was included in Google’s Cybersecurity Forecast 2025 as a primary threat, alongside state-sponsored threat actors and ransomware.

Nord Threat Protection Pro menu on Windows, showing options to turn on web and file protection, as well as vulnerability detection.

(Image credit: Future)

In the wake of all these evolving cyber threats, the likes of NordVPN are expanding the reach of their security offers with tools like its Threat Protection Pro – which was named as a top tool for malware and phishing protection – or its new ID-theft protection, NordProtect.

Most countries have also adopted laws to prevent cyberattacks as much as possible over the years. Organizations, government entities, and individuals have learned to protect sensitive data using virtual private network (VPN) software, firewalls, antivirus, and other security tools.

Yet, these efforts never seem to be enough.

That's because, Briedis explains, cybersecurity is not a fixed goal. He said: "We have to be adaptive and make sure that we are learning from these attacks. We need to be [cyber] resilience."

What's next?

While Briedis' RightsCon panel was mainly aimed at activists, NGOs, and other small organizations, everyone can take advantage of Nord's recommendations to be more cyber-resilient.

"The first thing is about education," he said.

Stay on top of the threats, familiarize yourself with security tech solutions, and share your knowledge. Remember to talk not only with your colleagues but also with your friends and family.

"The second part is shared responsibility." This means that it's everyone's responsibility to share the knowledge.

All in all, "Stay secure, stay cyber-resilient."

You might also like

TOPICS
Chiara Castro
News Editor (Tech Software)

Chiara is a multimedia journalist committed to covering stories to help promote the rights and denounce the abuses of the digital side of life – wherever cybersecurity, markets, and politics tangle up. She writes news, interviews, and analysis on data privacy, online censorship, digital rights, cybercrime, and security software, with a special focus on VPNs, for TechRadar and TechRadar Pro. Got a story, tip-off, or something tech-interesting to say? Reach out to chiara.castro@futurenet.com

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
A padlock resting on a keyboard.
AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Latest in VPN Privacy & Security
Swiss flag with view of Geneva city, Switzerland
Secure encryption and online anonymity are now at risk in Switzerland – here's what you need to know
Demonstrators protesting against the arrest of the Mayor of Istanbul Ekrem Imamoglu block Atatürk Boulevard on March 22, 2025 in Ankara, Türkiye.
Turkey's social media ban has been lifted, but VPN usage is still high
Shape of Russia filled with Russian flag-colored internet codes on a black hacking background
A new wave of blocks in Russia targets VPN apps and Cloudflare subnets
Digital hand set location on map with two pins. AI technology in GPs, innovation delivery, map location, future transport logistic, route path concept. GPs point. New office location, change address
What does your IP address reveal about you?
A stethoscope next to a laptop on a pink background
How to check if your VPN is working
Teenager playing on a gaming PC with two monitors
Is using a VPN while gaming cheating? 5 myths you shouldn't believe about gaming with a VPN
Latest in Features
Assassin's Creed
Assassin's Creed Shadows has Max subscribers streaming the 2016 movie flop – here are 3 better video game adaptations with over 90% on Rotten Tomatoes
David Kampf #64 of the Toronto Maple Leafs warms-up before playing the Philadelphia Flyers at the Scotiabank Arena on March 25, 2025 in Toronto, Ontario, Canada.
ChatGPT and Gemini Deep Research helped me choose an NHL team to support, and now I'm obsessed with ice hockey
Context Windows
Why are AI context windows important?
A collage of a demasked Spider-Man, Captain Marvel staring into the camera, and Daredevil shouting
17 Marvel heroes I want to see added to the Avengers: Doomsday cast – Spider-Man, Ms Marvel, Wolverine, and more
BERT
What is BERT, and why should we care?
Google Gemini 2.5 and ChatGPT o3-mini
I pitted Gemini 2.5 Pro against ChatGPT o3-mini to find out which AI reasoning model is best