Review Article
BibTex RIS Cite

Cybersecurity Communication in the Age of Digital Transformation: Zero Trust, Security Culture, and Resilience

Year 2026, Volume: 3 Issue: 1, 31 - 48, 31.01.2026
https://izlik.org/JA53NU32CK

Abstract

This study discusses the cybersecurity risks organizations face as digital transformation accelerates and the role of cybersecurity communication in managing these risks within a conceptual framework. Digitalization, cloud computing, the Internet of Things, big data, and artificial intelligence technologies, while restructuring processes, also expand the attack surface and can render traditional security approaches inadequate. The study emphasizes that security is not solely about technical controls but must be addressed in conjunction with human behavior, organizational culture, governance, and policy dimensions. To this end, open-access academic studies and reports published between 2020 and 2025 were evaluated through a descriptive literature review, and themes were developed around digital transformation, Industry 4.0 security, Zero Trust, AI-based threats, and the human factor. The findings indicate that the Zero Trust architecture enables continuous verification and dynamic access control within hybrid work and cloud ecosystems. Still, its success is closely related to security culture and communication strategies. While artificial intelligence enhances anomaly detection in defense, attackers' scaling methods, such as phishing and automated vulnerability scanning, increase the risk of detection. IoT and operational technology integration amplify cyber-physical risks that can impact operational continuity. Furthermore, the permanence of digital traces and metadata leaks necessitates that security communication be supported by privacy literacy. Consequently, the study argues that a cybersecurity communication approach that integrates awareness, education, and corporate governance, along with technical measures, is needed to harness the opportunities offered by digitalization safely.

References

  • Abrahams, T., Farayola, O., Kaggwa, S., Uwaoma, P., Hassan, A., & Dawodu, S. (2024). Cybersecurity awareness and education programs: A review of employee engagement and accountability. Computer Science & IT Research Journal, 5(1), 100–119. https://doi.org/10.51594/csitrj.v5i1.708
  • Akmeşe, S. (2020). Kamuda dijital dönüşümün siber güvenlik ve dijital güvence boyutları ve iç denetimin rolü. Denetişim, (20), 108–119.
  • Alashi, S. A., & Badi, D. H. (2020). The role of governance in achieving sustainable cybersecurity for business corporations. Journal of Information Security and Cybercrimes Research, 3(1), 97–112. https://doi.org/10.26735/eint7997 Alexei, A. (2021). Cybersecurity strategies for higher education institutions. Journal of Engineering Science, 28(4), 74–92. https://doi.org/10.52326/jes.utm.2021.28(4).07
  • Arat, T., & Aslan, M. M. (2021). Sosyal medyada veri güvenliği ve kişisel mahremiyet sorunu. Akdeniz İletişim Dergisi, 35, 387–401. https://doi.org/10.31123/akil.886402
  • Arsenovych, L., Nikolaievsky, O., Skliarenko, O., Lytvynenko, L., & Kydriavskyi, I. (2024). Organization of training with the use of digital technologies for ensuring cybersecurity in the educational space. WSEAS Transactions on Computer Research, 12, 524–536. https://doi.org/10.37394/232018.2024.12.51
  • Chepkoech, J., & Sitawa, M. (2023). Multi-stakeholder engagement in developing national cyber security to enhance national development. National Security: A Journal of the National Defence University–Kenya, 1(2), 115–133. https://doi.org/10.64403/sn1z4y54
  • Dodge, C., Fisk, N., Burruss, G., Moule, R., & Jaynes, C. (2023). What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory. Criminology & Public Policy, 22(4), 849–868. https://doi.org/10.1111/1745-9133.12641
  • Hasan, M. R., Sarkar, N. I., Alani, N. H. S., & Lutui, R. (2025). Cyber edge: Current state of cybersecurity in Aotearoa–New Zealand, opportunities, and challenges. Electronics, 14(14), 2915. https://doi.org/10.3390/electronics14142915
  • Henen, B. (2025). Cybersecurity in the digital era: Between digital transformation and protection challenges. Law and World, 11(35), 117–131. https://doi.org/10.36475/11.3.8
  • Howell, D. (2025, August 19). What is operational technology and why is it at risk? ITPro. Kalogiannidis, S., Paschalidou, M., Kalfas, D., & Chatzitheodoridis, F. (2023). Relationship between cyber security and civil protection in the Greek reality. Applied Sciences, 13(4), 2607. https://doi.org/10.3390/app13042607
  • Khadka, K., & Ullah, A. B. (2025). Human factors in cybersecurity: An interdisciplinary review and framework proposal. International Journal of Information Security, 24(3), Article 119. https://doi.org/10.1007/s10207-025-01032-0
  • Khidzir, N. Z., Ismail, A. R., Mat Daud, K. A., Abdul Ghani, M. S. A., & Ibrahim, M. A. H. (2016). Critical cybersecurity risk factors in digital social media: Analysis of information security requirements. Lecture Notes on Information Theory, 4(1), 18–24. https://doi.org/10.18178/lnit.4.1.18-24
  • Kuzior, A., Tiutiunyk, I., Zielińska, A., & Kelemen, R. (2024). Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies, 17(2), 220–239. https://doi.org/10.14254/2071-8330.2024/17-2/12
  • Levi, M., & Williams, M. L. (2013). Multi-agency partnerships in cybercrime reduction. Information Management & Computer Security, 21(5), 420–443. https://doi.org/10.1108/IMCS-04-2013-0027
  • Limna, P., Kraiwanit, T., & Siripipattanakul, S. (2023). The relationship between cyber security knowledge, awareness and behavioural choice protection among mobile banking users in Thailand. International Journal of Computing Sciences Research, 7, 1133–1151. https://doi.org/10.25147/ijcsr.2017.001.1.123
  • Lui, A., Womack, C., & Orton, P. (2025). Collaborative online international learning as a third space to improve students’ awareness of cybersecurity. Education and Information Technologies, 30(10), 13835–13856. https://doi.org/10.1007/s10639-025-13336-8
  • Millett, K., dos Santos, E., & Millett, P. D. (2019). Cyber-biosecurity risk perceptions in the biotech sector. Frontiers in Bioengineering and Biotechnology, 7, Article 136. https://doi.org/10.3389/fbioe.2019.00136
  • NIST (National Institute of Standards and Technology). (2020). Zero trust architecture (NIST Special Publication 800-207). https://doi.org/10.6028/NIST.SP.800-207
  • Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2023). Digital transformation and cybersecurity challenges for business resilience: Issues and recommendations. Sensors, 23(15), 6666. https://doi.org/10.3390/s23156666
  • Sarcea (Manea), O. A. (2023). How digital transformation and cyber security affect companies’ performance? In Managing Business Transformations during Uncertain Times (pp. 530–540). https://doi.org/10.25019/STR/2023.039
  • Serac, C. A. (2023). Digital transformation vulnerabilities: Assessing the risks and strengthening cyber security. Annals of Faculty of Economics, University of Oradea, 32(1), 771-781.
  • Setiawan, A., Wirawan, S., Djajakerta, H., & Haryanto, H. (2023). Student’s cybersecurity awareness in post COVID-19 pandemic. Journal of Economics, Finance and Management Studies, 6(10), 5057–5066. https://doi.org/10.47191/jefms/v6-i10-38
  • Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333–339. https://doi.org/10.1016/j.jbusres.2019.07.039
  • Türegün, N. (2025). Digital transformation and cybersecurity risks. International Journal of Accounting Information Systems, 56, 100749. https://doi.org/10.1016/j.accinf.2025.100749
There are 24 citations in total.

Details

Primary Language English
Subjects Information Security Management
Journal Section Review Article
Authors

İbrahim Halil Yaşar 0000-0002-1480-569X

Mehmet Uluç 0000-0003-3731-070X

Submission Date December 15, 2025
Acceptance Date December 31, 2025
Publication Date January 31, 2026
IZ https://izlik.org/JA53NU32CK
Published in Issue Year 2026 Volume: 3 Issue: 1

Cite

APA Yaşar, İ. H., & Uluç, M. (2026). Cybersecurity Communication in the Age of Digital Transformation: Zero Trust, Security Culture, and Resilience. Digital Security and Media, 3(1), 31-48. https://izlik.org/JA53NU32CK