DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

Trending

  • Does the OCP Exam Still Make Sense?
  • CDNs: Speed Up Performance by Reducing Latency
  • Zero Trust Network for Microservices With Istio
  • Mainframe Development for the "No Mainframe" Generation
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Security 2018 Surprises and 2019 Predictions (Part 1)

Security 2018 Surprises and 2019 Predictions (Part 1)

More breaches as companies move to the cloud and struggle to implement DevSecOps.

Tom Smith user avatar by
Tom Smith
CORE ·
Dec. 04, 18 · Analysis
Like (1)
Save
Tweet
Share
5.72K Views

Join the DZone community and get the full member experience.

Join For Free

Given the speed with which technology is changing, we thought it would be interesting to ask IT executives to share their thoughts on the biggest surprises in 2018 ad their predictions for 2019. Here's the first of several posts on what they told us about security.

2018 Observations

John Morello, CTO, Twistlock

Last year, we predicted developers would become more ingrained in the security element, specifically the CI processes. This prediction played out pretty much as expected — in the early days, we had to do a lot of evangelism about why it was valuable to have security embedded in the development process. Today, though, we don’t have to explain that, not only to customers already get it. They’re usually asking for help doing it. The big shift is that most savvy developers realize embedding security early actually makes their jobs easier so there’s a personal motivation to do it, beyond the obvious security advantages.

Equifax was a good example of what I often talk to customers about: most attacks do not involve awe-inspiring skill and 0-day exploits; those aren’t needed because so many well-known CVEs are out there and organizations are typically so far behind the curve in fixing them that they’re the path of least resistance. Similarly, there’s little value in trying to find the best firewalls and runtime technologies if you’re going to ignore the basics and just keep software up to date. The trend of having security embedded earlier in the development process helps with this, but as an industry, we need to move from a visibility to an enforcement model. Specifically, to ensure that vulnerable components can’t be deployed in the first place and to integrate security tooling into the CI/CD flows to do that automatically, as part of every deployment.

John Leon, VP of Business Development & Strategic Alliances, Twistlock

DevOps to DevSecOps...it’s become clear that the most successful enterprises effectively leverage technology for competitive advantage are those that have created an organizational environment that balances speed of delivery with a cross-team responsibility for security. This trend will accelerate and become best practice in the enterprise as well as work its way into the mid-market. The tools available to effectively build, ship, run, and secure application code are pervasive and becoming better understood certainly by the development teams, but more so in the security side of the house as well.

Brajesh Goyal, Vice President, Engineering, Cavirin Systems

We expected DevOps and SecOps (aka DevSecOps) would take off. What has happened is that there is still pushback as to how to automate and potential job loss.

Security, especially across multiple clouds and in combination with on-prem, will continue to be top of mind. Additional awareness of both insider and external threats must be combined with effective tools that balance protection and usability. More CISOs will peer with CIOs as opposed to reporting to them.

Don Boxley, CEO and Co-Founder,

It was extremely surprising given the number of well-publicized data breaches where perimeter security was almost always to blame, that more was not done to ensure perimeter security, that alternative approaches were not demanded by the C-suite, and that more IT professionals did not find themselves with their heads on the chopping block.

Daniel Okine, Senior Director of Product Management, Adaptiva

The amount of money flowing into blockchain startups without real uses for the technology has been surprising. While some actual innovation is taking place, it has a long way to go to live up to the hype and the dollars associated with it.

Laura Lee, Executive Vice President of Rapid Prototyping, Circadence

Surprises

Ransomware attacks on city services. The Wanna-cry ransomware attacks of 2017 were a wake-up call to the healthcare industry about the threat and disruption of cyber-attacks. It brought attention to cybersecurity to a much broader public audience. Unfortunately, attackers upped their game to successfully attack Atlanta (and Baltimore, Dallas, San Francisco, and Charlotte). The March 2018 attack in Atlanta cost over $2M for incident response and another $9.5M to repair the damage. Months after the ransomware attack, Atlanta still deemed over 30 percent of programs once considered mission critical, practically inoperable.

The SamSam ransomware used in Atlanta used brute force techniques to guess weak passwords. The attack crippled city services including utilities, law enforcement, and bill payment, forcing a return to handwritten transactions. City services typically involve numerous software applications and staff accounts where the SamSam techniques can be successful. Let’s hope that other cities, regions, and states take note and prepare themselves.

The magnitude of the damage was my security surprise for 2018.

Predictions

I believe we will see a lot more “Atlantas” (e.g., city/state government under broad attack). They are a soft target; we have many targets and ransomware pays sometimes. Much like the election system, there are so many out-of-date systems used for HR, IT, etc. that I think we will see a lot more of those.

Other 2019 cybersecurity predictions include:

  • Increase in social media infiltration

  • Exploiting company’s fear of damaged reputation from attacks

  • Better alignment between CISO and C-Suite

  • Integration of security efforts for IT/OT infrastructure

Harry Sverdlove, CTO & Founder, and Sean Lutner, Infrastructure Architect, Edgewise Networks

Ransomware attacks have declined after several years of steady growth, but we haven’t solved the problem. Companies haven't gotten better at encryption or backup, so why did attackers back off ransomware attacks? Likely because attackers have found that quality over quantity in attacks is more profitable, or that data in hand is far more valuable than potential ransom for inaccessible data.

We’re on track to see almost 5 billion records compromised in data breaches for 2018. The prediction is that the number of records compromised in publicly disclosed data breaches for 2019 will surpass the population of planet Earth (7.6 billion people).

security

Opinions expressed by DZone contributors are their own.

Trending

  • Does the OCP Exam Still Make Sense?
  • CDNs: Speed Up Performance by Reducing Latency
  • Zero Trust Network for Microservices With Istio
  • Mainframe Development for the "No Mainframe" Generation

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: