{"id":32622,"date":"2020-01-05T23:00:05","date_gmt":"2020-01-05T23:00:05","guid":{"rendered":"http:\/\/554f3a31-1fad-4b3d-b929-9537d55679b0"},"modified":"2020-01-05T23:00:05","modified_gmt":"2020-01-05T23:00:05","slug":"these-five-tech-trends-will-dominate-2020","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/","title":{"rendered":"These five tech trends will dominate 2020"},"content":{"rendered":"<p><a href=\"https:\/\/www.zdnet.com\/article\/these-six-enterprise-tech-trends-defined-2019\/\">These six enterprise tech trends defined 2019<\/a>As we kick off another year, ZDNet&#8217;s global team of editors has put together a list of five tech trends that will have a significant impact on the enterprise in 2020. The effects could be negative or positive, but will undoubtedly be substantial. Our panel of editors includes &#8212; <a href=\"https:\/\/www.techrepublic.com\/meet-the-team\/us\/bill-detwiler\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">TechRepublic&#8217;s Bill Detwiler<\/a>, <a href=\"https:\/\/www.zdnet.com\/meet-the-team\/us\/larry-dignan\/\">Larry Dignan<\/a>, <a href=\"https:\/\/www.zdnet.com\/meet-the-team\/au\/chris-duckett\/\">Chris Duckett<\/a>, and <a href=\"https:\/\/www.zdnet.com\/meet-the-team\/uk\/steve-ranger\/\">Steve Ranger<\/a>.<\/p>\n<p><strong>Take a look back at best of the decade:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/zdnets-top-enterprise-ceos-of-the-2010s\/\">ZDNet&#8217;s top enterprise CEOs of the 2010s<\/a> | <a href=\"https:\/\/www.zdnet.com\/article\/the-pc-was-supposed-to-die-a-decade-ago-instead-this-happened\/\">The PC was supposed to die a decade ago. Instead, this happened<\/a> | <a href=\"https:\/\/www.zdnet.com\/article\/a-decade-of-malware-top-botnets-of-the-2010s\/\">A decade of malware: Top botnets of the 2010s<\/a> | <a href=\"https:\/\/www.zdnet.com\/article\/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s\/\">A decade of hacking: The most notable cyber-security events of the 2010s<\/a> | <a href=\"https:\/\/www.zdnet.com\/article\/device-of-the-decade-why-did-it-take-nine-years-for-the-ipad-to-get-its-own-operating-system\/\">Device of the decade: Why did it take nine years for the iPad to get its own operating system?<\/a> | <a href=\"https:\/\/www.cnet.com\/2010s-decade-in-review\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">CNET&#8217;s Decade in Review<\/a><\/p>\n<p>We begin our list with dark clouds on the horizon for chip manufacturing giant:<\/p>\n<h2><strong>Intel: A world of pain<\/strong><\/h2>\n<p>Saying Intel is going out of business makes as much sense as saying Apple or Microsoft or Google are doomed &#8212; it&#8217;s simply not going to happen in the near term. That doesn&#8217;t mean it is going to be smooth sailing for the chip giant, as 2020 looks to be anything but.<\/p>\n<p>The company&#8217;s competitors are lined up to feed off its traditional juicy margins, after years of being the dominant player.<br \/>The comeback kid of silicon &#8212; AMD &#8212; is lined up to <a href=\"https:\/\/www.zdnet.com\/article\/lenovo-and-hpe-release-servers-based-on-amds-2nd-gen-eypc-chip\/\">tackle the server market<\/a> again, and has returned to the <a href=\"https:\/\/www.zdnet.com\/product\/microsoft-surface-laptop-3-15-inch\/\">high-end laptop market<\/a>.<br \/>Laptops based on Arm chips are still restricted in what applications they can run in Windows, but that hasn&#8217;t stopped vendors rolling the dice and trying to <a href=\"https:\/\/www.zdnet.com\/article\/first-5g-laptop-lenovo-and-qualcomm-showcase-always-on-pc-due-in-early-2020\/\">create the device<\/a> cracks the market open. They will keep rolling, and eventually are going to hit the mark.<\/p>\n<p>With a cupboard bare of options and growth markets, such as a <a href=\"https:\/\/www.zdnet.com\/article\/intel-scraps-5g-phone-mobile-business\/\">mobile-focused chip business<\/a> or a proper GPU offering for machine learning, there is little left to play with should AMD or Arm chips gain significant momentum.<\/p>\n<p>It isn&#8217;t the end times, but 2020 could be a very dark trip around the sun.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2019\/02\/24\/1ddbfbbb-c009-4e1e-b039-7ebedef73f25\/resize\/470xauto\/be8166c03af113b4aff71a447244b797\/nokia-ceo-5g-mwc.jpg\" class alt=\"nokia-ceo-5g-mwc.jpg\" height=\"auto\" width=\"470\"><\/span> <span class=\"credit\">(Image: Corinne Reichert\/ZDNet)<\/span><\/p>\n<h2><strong>5G: Business grabs the opportunity<\/strong><\/h2>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/what-is-5g-the-business-guide-to-next-generation-wireless-technology\/\">5G<\/a>&nbsp;has plenty of benefits for the mobile operators themselves (like increasing the amount of bandwidth they can offer from the same amount of spectrum) but the benefits to consumers aren&#8217;t so obvious. Don&#8217;t expect that to change much in 2020; 5G will still be a technology largely in search of a killer application.<\/p>\n<p>Slowing refresh cycles mean that it will take a while for <a href=\"https:\/\/www.zdnet.com\/article\/best-5g-smartphones\/\">5G phones<\/a> to become common, and in any case 5G networks are <a href=\"https:\/\/www.zdnet.com\/article\/dreaming-of-5g-mobile-many-are-still-waiting-for-4g-to-arrive\/\">only being rolled out gradually<\/a>. Rows over the <a href=\"https:\/\/www.zdnet.com\/article\/europe-warns-5g-will-increase-attack-paths-for-state-actors\/\">politics of 5G<\/a> could still slow those roll-outs down further, as could a whole new set of <a href=\"https:\/\/www.zdnet.com\/article\/5g-hackers-these-six-groups-will-try-to-break-into-the-networks-of-tomorrow\/\">5G security threats<\/a>. It could be late in 2020 by the time a <a href=\"https:\/\/www.zdnet.com\/article\/apples-2020-iphones-expect-all-models-to-offer-5g-after-1bn-intel-deal\/\">5G iPhone arrives<\/a>: only at that point will 5G really become a mainstream technology for consumers, at which point low-latency gaming and <a href=\"https:\/\/www.zdnet.com\/article\/a-look-into-the-future-of-ar-and-vr-for-business-and-pleasure-from-tentacles-and-time-travellers-to-smart-soldiers-and-digital-doctors\/\">AR and VR apps<\/a> might start to take off.<\/p>\n<p>However, it could be that the defining usage of 5G in 2020 is by the enterprise. That might not mean developments as exciting as <a href=\"https:\/\/www.zdnet.com\/article\/inside-the-5g-ambulance-that-could-let-doctors-treat-you-miles-from-the-hospital\/\">the 5G ambulance<\/a>, but <a href=\"https:\/\/www.zdnet.com\/article\/will-the-smart-factory-benefit-from-5g-industry-experts-weigh-in\/\">Internet of Things applications<\/a>, which make industrial processes more efficient, and <a href=\"https:\/\/www.zdnet.com\/article\/edge-computing-the-state-of-the-next-it-transformation\/\">edge computing<\/a> will be key. Not as glamorous at AR gaming, but maybe more useful.<\/p>\n<h2><strong>Artificial Intelligence: AI will be everywhere but so will the pitfalls<\/strong><\/h2>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/what-is-ai-everything-you-need-to-know-about-artificial-intelligence\/\">Artificial Intelligence (AI)<\/a>&nbsp;and <a href=\"https:\/\/www.zdnet.com\/article\/what-is-machine-learning-everything-you-need-to-know\/\">machine learning (ML)<\/a> have become the goto technologies for businesses whether they want to boost productivity, increase customer engagement, or drive digital transformation. According to Gartner&#8217;s 2019 <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-07-15-gartner-survey-reveals-leading-organizations-expect-t\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">AI and ML Development Strategies<\/a> survey, 59% of respondents said they have deployed AI, and those companies that have, on average, are running four AI or ML projects.<\/p>\n<p>Both enterprise and consumer tech vendors are also racing to build AI into their products, via in-house development or M&amp;A. Tech giants like <a href=\"https:\/\/www.zdnet.com\/article\/you-are-what-you-eat-10-companies-apple-gobbled-up-in-the-past-year\/\">Apple<\/a>, Amazon, Facebook, Google, and Microsoft have been buying up AI and ML companies for a decade. <a href=\"https:\/\/www.zdnet.com\/article\/how-salesforce-got-its-developer-conference-right-while-microsoft-apple-facebook-and-google-lost-their-way\/\">Salesforce<\/a> acquired AI-startup <a href=\"https:\/\/www.zdnet.com\/article\/salesforce-acquires-ai-startup-metamind\/\">MetaMind<\/a> in 2016, marketing intelligence company <a href=\"https:\/\/www.zdnet.com\/article\/salesforce-buys-marketing-intelligence-firm-datorama\/\">Datorama<\/a> in 2018, and BI firm <a href=\"https:\/\/www.zdnet.com\/article\/salesforce-acquires-tableau-software-in-15-7-billion-deal\/\">Tableau<\/a> in 2019. <a href=\"https:\/\/newsroom.intel.com\/news-releases\/intel-ai-acquisition\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Intel spent $2 billion to acquire Israel-based AI chip maker Habana<\/a>, which develops &#8220;deep learning accelerators for the data center.&#8221; Microsoft owned <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-acquires-drawbridge-to-bolster-linkedins-marketing-platform\/\">LinkedIn acquired Drawbridge<\/a> with plans to incorporate the San Francisco-based company&#8217;s AI software into LinkedIn Marketing Solutions product. <a href=\"https:\/\/www.zdnet.com\/article\/hpe-buys-mapr-aims-to-extend-portfolio-for-ai-machine-learning-analytics\/\">HPE bought MapR<\/a> to help grow its AI, machine learning, and big data knowhow.<\/p>\n<p>Even non-tech companies are snapping up AI firms. <a href=\"https:\/\/www.zdnet.com\/article\/what-mcdonalds-acquisition-of-dynamic-yield-tells-us-about-digital-transformation\/\">McDonald&#8217;s acquired machine-learning company Dynamic Yield<\/a> with plans to use their technology to personalize menu experiences and improve sales. Nike acquired inventory management company <a href=\"https:\/\/www.zdnet.com\/article\/nike-acquires-celect-adds-to-data-science-team\/\">Celect<\/a> and data analytics company <a href=\"https:\/\/www.zdnet.com\/article\/nikes-purchase-of-analytics-firm-zodiac-highlights-focus-on-customer-lifetime-value\/\">Zodiac<\/a>.<\/p>\n<p>As we move into 2020, the AI gold rush should accelerate as <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-07-15-gartner-survey-reveals-leading-organizations-expect-t\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Gartner expects the average number of AI or ML projects<\/a> to increase from 4 to 10. Businesses however will also need to address the multiple challenges the technology brings with it, such as the misuse of AI (e.g. <a href=\"https:\/\/www.zdnet.com\/article\/deepfakes-for-now-women-are-the-main-victim-not-democracy\/\">deepfakes<\/a>), <a href=\"https:\/\/www.techrepublic.com\/article\/welsh-police-facial-recognition-has-92-fail-rate-showing-dangers-of-early-ai\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">facial recognition mistakes<\/a>, over-personalization, <a href=\"https:\/\/www.zdnet.com\/article\/from-low-code-and-cloud-to-ai-and-encryption-what-you-do-with-data-needs-to-be-about-more-than-buzzwords\/\">data security and privacy<\/a> concerns, and <a href=\"https:\/\/www.zdnet.com\/article\/apple-card-issuer-investigated-over-gender-bias-in-credit-algorithm\/\">unintentional bias<\/a>.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/these-five-tech-trends-will-dominate-2020\/\" class=\"lazy\" alt=\"ransomware-why-were-still-losing-the-fig-5da5c838b93c140001b0d2b7-1-oct-18-2019-22-02-18-poster.jpg\" height=\"auto\" width=\"470\" data-original=\" https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2019\/11\/05\/b1ff7740-1672-42ba-8c74-ec9570cbc886\/resize\/470xauto\/9d9b9c4b2a05c000c31a3bc6ffee94cb\/istock-1032532094.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2019\/11\/05\/b1ff7740-1672-42ba-8c74-ec9570cbc886\/resize\/470xauto\/9d9b9c4b2a05c000c31a3bc6ffee94cb\/istock-1032532094.jpg\" class alt=\"ransomware-why-were-still-losing-the-fig-5da5c838b93c140001b0d2b7-1-oct-18-2019-22-02-18-poster.jpg\" height=\"auto\" width=\"470\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Getty Images\/iStockphoto<\/span><\/p>\n<h2><strong>Security in 2020: Wider, deeper, stranger threats \u2013 but don&#8217;t forget the basics<\/strong><\/h2>\n<p>The constant drip-drip of data leaks and privacy catastrophes show that security is still, at best, a work-in-progress for many organisations. And security is still a minor consideration for many business leaders too.. Perhaps that&#8217;s because there have been so many leaks that they think the risk to their reputation is low.<\/p>\n<p>It&#8217;s a <a href=\"https:\/\/www.zdnet.com\/article\/malware-attacks-on-hospitals-are-rising-fast-and-the-problem-is-about-to-get-a-lot-worse\/\">dangerous assumption to make<\/a>. More apps and more devices mean security teams are already spread too thinly. Add in new risks like <a href=\"https:\/\/www.zdnet.com\/article\/iot-security-now-dark-web-hackers-are-targeting-internet-connected-gas-pumps\/\">Internet of Things projects<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/5g-hackers-these-six-groups-will-try-to-break-into-the-networks-of-tomorrow\/\">5G devices<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/forget-email-scammers-use-ceo-voice-deepfakes-to-con-workers-into-wiring-cash\/\">deepfakes<\/a> and the challenges mount unless companies take the broadest possible view of security.&nbsp; <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-cybercriminals-are-adding-a-new-twist-to-their-demands\/\">Organised crime and ransomware<\/a> will still be the most consistent threats to most businesses; state-sponsored attacks and cyber-espionage will remain an exotic but potentially high-profile threat to a minority.&nbsp;<\/p>\n<p>For all this, the biggest risks will still be <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-spear-phishing-email-has-doubled-in-a-year-so-heres-how-to-beat-it\/\">the basic ones<\/a>; staff <a href=\"https:\/\/www.zdnet.com\/article\/phishing-emails-are-still-managing-to-catch-everyone-out\/\">falling for phishing emails<\/a>, or using their <a href=\"https:\/\/www.zdnet.com\/article\/44-million-microsoft-users-reused-passwords-in-the-first-three-months-of-2019\/\">pets&#8217; names as passwords<\/a>, and poorly configured cloud apps. There will always be new threats, so <a href=\"https:\/\/www.zdnet.com\/article\/2020-is-when-cybersecurity-gets-even-weirder-so-get-ready\/\">prepare for the strangest<\/a> while not forgetting the basics.<\/p>\n<h2><strong>Multicloud: Evolution continues<\/strong><\/h2>\n<p>If 2019 was the year when multicloud became a real architectural consideration, 2020 will be the year where we&#8217;ll find out if the talk actually becomes reality. If multicloud does become reality, there will be a big role for companies that can operate as Switzerland within enterprises. IBM&#8217;s purchase of Red Hat <a href=\"https:\/\/www.zdnet.com\/article\/ibm-rometty-outline-red-hat-strategy-heres-how-the-parts-fit-together-for-ibm-growth\/\">revolves around all the enterprises that are looking to go multicloud<\/a>. Dell Technologies aims to extend its role from data center and hybrid cloud <a href=\"https:\/\/www.zdnet.com\/article\/vmware-is-the-glue-of-dell-technologies-hybrid-cloud-end-user-and-data-center-as-a-service-strategies\/\">to using VMware to bridge multiple providers<\/a>. There will also be more enterprise case studies to outline best practices. Ultimately, economics will drive multicloud moves. The reality may be that enterprises choose to go with one preferred cloud provider and another one to keep the incumbent honest. The technology to hop between cloud providers isn&#8217;t fully baked yet, but Kubernetes, abstraction layers and other tools are making it more possible.&nbsp;<br \/>A sidebar to this multicloud evolution in 2020 is going to be <a href=\"https:\/\/www.zdnet.com\/article\/top-cloud-providers-2019-aws-microsoft-azure-google-cloud-ibm-makes-hybrid-move-salesforce-dominates-saas\/\">that cloud providers<\/a> are likely to get a bit chippy as they swipe market share from each other. For now, the cloud pie is big enough for all. As soon as that pie shrinks, the FUD wars will begin.<\/p>\n<h3><strong>Must read:<\/strong><\/h3>\n<p><a href=\"https:\/\/www.techrepublic.com\/meet-the-team\/us\/bill-detwiler\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Bill Detwiler<\/a>, <a href=\"https:\/\/www.zdnet.com\/meet-the-team\/au\/chris-duckett\/\">Chris Duckett<\/a>, and <a href=\"https:\/\/www.zdnet.com\/meet-the-team\/uk\/steve-ranger\/\">Steve Ranger<\/a> contributed to this report. &nbsp;<\/p>\n<h3><strong>ZDNET&#8217;S MONDAY MORNING OPENER<\/strong><\/h3>\n<p><em>The Monday Morning Opener is our opening salvo for the week in tech. Since we run a global site, this editorial publishes on Monday at 8am AEST in Sydney, Australia, which is 6pm Eastern Time on Sunday in the US. It is written by a member of ZDNet&#8217;s global editorial board, which is comprised of our lead editors across Asia, Australia, Europe, and North America.<\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/these-five-tech-trends-will-dominate-2020\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s a look at the technology trends that will most shape the enterprise market in 2020.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32623,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-32622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>These five tech trends will dominate 2020 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"These five tech trends will dominate 2020 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-05T23:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/these-five-tech-trends-will-dominate-2020.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"470\" \/>\n\t<meta property=\"og:image:height\" content=\"251\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"These five tech trends will dominate 2020\",\"datePublished\":\"2020-01-05T23:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/\"},\"wordCount\":1334,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/these-five-tech-trends-will-dominate-2020.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/\",\"name\":\"These five tech trends will dominate 2020 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/these-five-tech-trends-will-dominate-2020.jpg\",\"datePublished\":\"2020-01-05T23:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/these-five-tech-trends-will-dominate-2020.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/these-five-tech-trends-will-dominate-2020.jpg\",\"width\":470,\"height\":251},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-five-tech-trends-will-dominate-2020\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"These five tech trends will dominate 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These five tech trends will dominate 2020 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/","og_locale":"en_US","og_type":"article","og_title":"These five tech trends will dominate 2020 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-05T23:00:05+00:00","og_image":[{"width":470,"height":251,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/these-five-tech-trends-will-dominate-2020.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"These five tech trends will dominate 2020","datePublished":"2020-01-05T23:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/"},"wordCount":1334,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/these-five-tech-trends-will-dominate-2020.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/","url":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/","name":"These five tech trends will dominate 2020 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/these-five-tech-trends-will-dominate-2020.jpg","datePublished":"2020-01-05T23:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/these-five-tech-trends-will-dominate-2020.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/these-five-tech-trends-will-dominate-2020.jpg","width":470,"height":251},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/these-five-tech-trends-will-dominate-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"These five tech trends will dominate 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32622"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32622\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32623"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}