All Insights
Energy & Infrastructure

The Future of Computers and Cybersecurity: When Code Becomes Power

From invisible code to real-world consequences: how AI, cyber warfare, and systemic vulnerabilities are reshaping the foundations of modern society.

April 22, 202610 min read

A World Written in Code

There was a time when computers lived in the background of society. They calculated, stored, and transmitted information, but they did not fundamentally shape the physical world around us. That distinction is disappearing rapidly. Today, code is no longer just a representation of reality—it is increasingly a mechanism that controls it.

Power grids are balanced through software. Hospitals rely on digital systems to monitor patients and deliver care. Cars are governed by embedded computers that decide how and when to brake, accelerate, or steer. Even agriculture, logistics, and water systems depend on layers of interconnected software. In this world, a vulnerability in code is no longer a minor flaw. It is a potential point of failure in the fabric of society itself.

The foundational problem is deceptively simple: as long as humans write code, there will be mistakes. Every line of software introduces complexity, and with complexity comes unpredictability. This has always been true, but what has changed is the scale and the consequence. A bug in a desktop application used to be inconvenient. A bug in a control system for energy infrastructure can now have systemic effects.

What makes this moment particularly unique is the convergence of three forces. First, the sheer ubiquity of software in physical systems. Second, the increasing interconnectivity between those systems through the internet. And third, the emergence of advanced artificial intelligence capable of understanding and manipulating code at a level that begins to rival human expertise. Companies like Anthropic are developing models that can identify weaknesses in foundational software layers—systems that were once considered relatively stable and secure. These tools are not just faster versions of existing methods; they represent a qualitative shift in how vulnerabilities are discovered.

The result is a world where code becomes a form of power. Not metaphorically, but literally. Whoever understands, controls, or exploits software gains leverage over systems that sustain modern life. This transforms cybersecurity from a technical discipline into a strategic domain, comparable to energy, defense, or food security.

The Market for Vulnerabilities and the Logic of Incentives

To understand the future of cybersecurity, it is not enough to look at technology alone. One must also examine incentives. Over the past two decades, a global market has emerged around vulnerabilities and exploits. This market operates in multiple layers, ranging from open and transparent to opaque and covert, but its underlying logic is consistent: information about weaknesses has value.

In the early days of cybersecurity, researchers who discovered vulnerabilities were often motivated by curiosity, reputation, or a desire to improve systems. Recognition within the community functioned as a form of currency. Over time, this informal system evolved into more structured mechanisms such as bug bounty programs, where companies pay researchers to disclose vulnerabilities responsibly.

However, this is only one side of the market. There are also actors willing to pay significantly higher prices for vulnerabilities that remain undisclosed. These can include private firms, intermediaries, and government agencies. The same piece of information—a flaw in widely used software—can have vastly different values depending on how it is used. If disclosed, it can be patched and neutralized. If kept secret, it can be weaponized.

This creates a structural tension that is difficult to resolve. The incentives for disclosure and the incentives for secrecy are not aligned. In many cases, the highest bidder determines the outcome. As a result, vulnerabilities do not simply exist as technical artifacts; they circulate as commodities within a global economy.

What is particularly striking is the normalization of this market. The trade in vulnerabilities and exploits is not confined to illegal activities. It is, to a significant extent, institutionalized. Governments purchase capabilities to enhance their cyber operations. Private companies develop tools that can be used for both defensive and offensive purposes. The boundaries between legitimate security research and weaponization are often blurred.

This evolution has broader implications. It suggests that cybersecurity cannot be fully understood through the lens of prevention alone. It must also be understood as a dynamic system of incentives, where actors respond to economic and strategic pressures. As long as vulnerabilities have value, there will be mechanisms to discover, trade, and exploit them.

From Digital Intrusion to Physical Consequences

One of the most profound shifts in recent years is the way in which cyber risks are extending into the physical world. This is where the abstract nature of software vulnerabilities becomes tangible, and sometimes dangerous.

Modern vehicles provide a clear example. What used to be mechanical systems are now controlled by networks of electronic components communicating through software. Features such as drive-by-wire, over-the-air updates, and connectivity to external networks introduce new functionalities, but also new attack surfaces. If these systems are not properly segmented, an attacker could theoretically interfere with critical functions. The idea that a car might be remotely manipulated no longer belongs solely to science fiction. While safeguards exist and continue to improve, the underlying complexity ensures that risk cannot be entirely eliminated.

Energy systems represent an even more critical domain. The discovery of Stuxnet marked a turning point in how the world understood cyber threats. This piece of malware demonstrated that software could be used to physically damage industrial equipment while remaining undetected by operators. It was not simply an attack on data; it was an attack on machinery, on infrastructure, and ultimately on national capability.

Since then, the attack surface has only expanded. Power grids are increasingly digitized. Renewable energy systems rely on distributed control mechanisms. Industrial processes are monitored and adjusted through centralized software platforms. Each of these developments brings efficiency and flexibility, but also introduces dependencies that can be exploited.

Healthcare systems offer another perspective. Hospitals depend on digital networks for everything from patient records to life-support systems. Cyberattacks that disrupt these networks can delay treatments, force evacuations, or compromise critical services. In such cases, the line between cyber risk and human safety becomes blurred.

What ties these examples together is a fundamental shift: the integration of digital systems into the core functions of society. Cybersecurity is no longer about protecting information alone. It is about protecting the continuity of services that people depend on every day.

Artificial Intelligence and the Acceleration of the Cyber Arms Race

Artificial intelligence is often described as a transformative technology, but in the context of cybersecurity, it functions primarily as an accelerator. It amplifies existing dynamics, making both attacks and defenses more efficient, scalable, and adaptive.

Traditionally, discovering vulnerabilities required significant expertise and time. Techniques like fuzzing relied on generating vast numbers of inputs and observing system behavior. While effective, this approach was inherently probabilistic and resource-intensive. AI changes this by introducing elements of prediction and understanding. Instead of blindly searching for weaknesses, AI systems can analyze code structures, identify patterns, and infer where vulnerabilities are likely to exist.

Models such as those developed by Anthropic illustrate this shift. By applying machine learning to the problem of code analysis, these systems can uncover flaws in foundational software layers that might otherwise remain hidden for years. This has clear benefits for defenders, who can use these tools to identify and patch vulnerabilities more quickly.

However, the same capabilities can be leveraged by attackers. An AI system that can identify weaknesses can also suggest ways to exploit them. It can generate attack vectors, adapt to defensive measures, and operate at a scale that exceeds human capacity. This dual-use nature of AI creates a feedback loop, where advances on one side drive advances on the other.

The result is an intensification of what can be described as a cyber arms race. Nations, corporations, and independent actors invest in capabilities not only to defend themselves, but also to maintain strategic advantage. Unlike traditional arms races, this one is less visible and more diffuse. It does not require large physical infrastructures or clear declarations of intent. It unfolds quietly, within codebases, networks, and data centers.

This raises difficult questions about control and governance. If the most powerful tools for vulnerability discovery are restricted to a small number of actors, what does that mean for the broader ecosystem? If they are widely available, how do we prevent misuse? There are no simple answers, but the trajectory is clear: AI will play an increasingly central role in shaping the balance between attackers and defenders.

Living with Uncertainty: Toward a New Digital Equilibrium

If there is one conclusion that emerges from these developments, it is that perfect security is unattainable. This is not a failure of effort or technology, but a consequence of complexity. Modern systems are too interconnected, too dynamic, and too dependent on software to be fully secured in an absolute sense.

This does not mean that the situation is hopeless. It means that the objective must shift from absolute prevention to managed risk. Systems need to be designed with resilience in mind. Redundancy, segmentation, and fail-safe mechanisms become as important as traditional security measures. The goal is not to eliminate vulnerabilities, but to ensure that their impact can be contained.

At the same time, there is a need for a broader societal response. Cybersecurity cannot be left solely to technical experts or private companies. It involves questions of governance, responsibility, and collective action. Who is accountable when critical infrastructure is compromised? How should vulnerabilities be regulated or disclosed? What role should governments play in both defending and, in some cases, exploiting digital systems?

The borderless nature of cyberspace complicates these questions. Unlike physical domains, where jurisdiction is relatively clear, cyber operations can cross boundaries instantaneously. This challenges traditional notions of sovereignty and law. Efforts to impose control often encounter resistance or unintended consequences.

Perhaps the most important shift is conceptual. We must begin to see cybersecurity not as a separate domain, but as an integral part of how modern society functions. Just as we accept certain risks in transportation, energy, or healthcare, we will need to accept that digital systems come with inherent uncertainties. The task is to manage those uncertainties intelligently.

In this context, the question of whether hackers will take over cars or energy systems becomes part of a larger narrative. The capability exists, and in some cases has already been demonstrated in limited forms. But the future will not be defined by isolated incidents. It will be defined by how societies adapt to a world where such capabilities are part of the landscape.

We are moving toward a new equilibrium, one in which security is dynamic rather than static, and where trust must be continuously earned and maintained. In that world, cybersecurity is not just about defending systems. It is about sustaining the conditions under which those systems can function reliably.

Ultimately, the future of computers and cybersecurity is not a story about machines. It is a story about power, responsibility, and the choices we make in a world increasingly shaped by code.

Part of

Energy & Infrastructure

The future of grids, distributed systems, storage, heat, water and geopolitical dependency. A pillar about the hidden structures that determine what modern societies can sustain.

Explore this pillar

More essays