Skip to main content

Cyber Security in 2020 and beyond

04.Dec.2019
Outpost24 product managers
Full Stack Security
As digital transformation continues to take hold, enterprises across industries are under mainstream pressure to tighten their cyber defense as they evolve to cloud and become more application centric. Despite many boards boosting security resources and increasing spend in 2019, more than 3,800 data breaches have hit organizations with dire consequence. In the spirit of the holiday season we have compiled a list of 2020 predictions from our in-house security experts on the key trends and threats that should be high on any CISO’s agenda to deliver greater cyber hygiene and multi-layered defense.
Cyber Security in 2020 and beyond


 

Application security and threat intelligence trends, Simon Roe, Product Manager

#1 Website attacks

GDPR and costly fines associated with data breach will continue to make headline news in 2020 featuring Magecart in highly successful hacks. Big brands including Macy’s, Ticketmaster and British Airways have suffered at the hand of such attack, with the latter resulting in record GDPR fine of £183m (1.5% of their global turnover). Megacart works by gaining web access and injecting malicious javascript to steal sensitive data, typically through credit card skimming, for financial gain. It takes advantage of companies’ lack of visibility into their web-facing attack surface and complex third-party service integrations.

#2 DevSecOps goes mainstream

With DevSecOps gaining mainstream traction, the tools enabling security to easily be built into the CI/CD process will become more readily available in 2020. To further enable DevSecOps, a focus on education will increase as developers are being ‘shifted to the left’ to become both security champions and code warriors. The need for organizations to have a well-developed, and embedded education program covering the key aspects of secure coding practices such as the OWASP and has a layered defence will become more apparent with the increased adoption of DevSecOps. Automation is the ultimate tool to support DevSecOps adoption and will kick start security testing throughout the SDLC from development, deployment to production to ensure ongoing assessment of critical apps.

#3 Automation and continuous risk assessment for critical apps

To combat the continual breach of applications, and the ever increasing demands on time brought on by DevSecOps practices, organizations will look for a more continuous solution to assess critical applications to give them greater visibility throughout the lifecycle, irrespective of where and when it is deployed or updated - continually feeding back into the development backlog for efficient management and handling. Automated testing tools for application security will be key to supporting a DevSecOps approach in 2020 allowing internal teams to collaborate and work more efficiently whilst updates and new releases are continuously tested against security guidelines.

#4 Risk based approach and predictive model coming of age

Organizations will continue to adopt a risk based prioritization for vulnerability management and remediation. As pressure increases on organizations to remediate quickly, this approach helps stretched security teams focus efforts and be more efficient , moving from a ‘patch all’ critical vulnerabilities to patch vulnerabilities that pose a true risk to their business first. Threat intelligence tools provide context around vulnerabilities, enabling prioritization and better-informed decision making.

As vendors build predictive models to further enhance risk-based prioritization of vulnerabilities, these models will attempt to guide organizations by predicting what vulnerabilities are likely to be weaponized and used next. Organizations will through 2020 start to adopt these types of services more and more to build more effective vulnerability management programmes.


 

cloud security trends


 

Cloud security trends, Sergio Loureiro, Product Manager

#5 Multi-cloud adoption grows and so does the risk

In 2019 we have seen a strong growth of multi-cloud adoption, with more than 73% of organizations using 2 or more cloud providers. Organizations and business units are choosing the best provider for their use cases, and application development are increasing shifting to the cloud in search of lower compute costs and increased flexibility. This continual rise will see cloud becoming a growing target for threat actors in 2020, as hackers take note of the opportunities surrounding multi-cloud and misconfiguration. With cloud spawn and confusion over the shared responsibility model, security professionals will continue to be challenged by misconfiguration and the need for cloud workload protection. AWS dominates this market so expect to see more attacks hitting the news in 2020.

Get Cloud security ready with our securing public clouds guide.

#6 Cloud providers double down on security, but there’s a catch

Cloud providers will continue to push into security, with integrated solutions, such as Azure Security Center, AWS Security Hub or GCP Command Center. These solutions will increase their market share amongst customers with low legacy architectures but will not support multi-cloud scenario and complex hybrid architectures. In order to protect your cloud infrastructure and build security assurance, organizations need the tools to automate discovery of cloud assets and homogenize security controls across providers to achieve a single view of the risk profile.

#7 Containerization of apps and infrastructure as code

Containers and shift left security will continue its path to become common practice. The next phase will see an increased adoption of security by design through Infrastructure as Code, such as AWS Cloud Formation, Azure Resource Manager and GCP Cloud Deployment Manager. Containerized apps bring additional security concerns, in 2020 organizations will need greater visibility and context on vulnerabilities in order to harden container infrastructures through automated and integrated security assessment.


 

Technology and hacking trends


 

Technology and hacking trends, Martin Jartelius, CSO and Hugo Van den Toorn, Product Manager 


#8 Organizations continue to overlook basic security hygiene

We predict that most breaches will be down to old forgotten systems, outdated software and poor access management leading to high consequences of breach of individual users. So, a misguided focus towards what’s “new and cool” rather than a responsible clean-up of the mistakes will continue to plague businesses, when a big majority of the risks could be resolved with proper security hygiene, regular risk review and security assessment.

#9 Supply chain attacks go large

Although supply chain attacks seem limited to more advanced and determined adversaries, the risk is evolving. What to do when you struggle to catch the big fish? Poison it’s bait! Target a supplier that has far less security control in place and from that ‘island’ you can jump straight onto your target. From a defensive perspective this is also a difficult thing to secure from. The larger the organization, the harder it is to enforce security and perform business impact assessments for each and every supplier. 2020 might just be the year that gives us more large-scale examples of this threat.

#10 Business email compromise and phishing

BEC and phishing in general is ever evolving and will most likely continue to grow in both volume and sophistication. The past year we have seen an increase in advanced phishing methods targeting applications secured with two-factor authentication (2FA) and almost all reporting phishing website appear to use a secure HTTPS connection. Although it is a good trend that 2FA and use of HTTPS is being adopted, we see that end-users still fall prey to phishing. Hopefully 2020 will also be the year of increase support and adoption for hardware authentication devices.

#11 From phishing to smishing

In line with phishing, SMS phishing (or Smishing) seems to be on the rise. More and more Smishing campaign appear to be executed by adversaries, most of which are going full-circle to where we were ten-or-so years ago with email: The sender can easily be spoofed, and we will rely on the inherent trust users have in this type of messages. Most Smishing campaigns don’t seem to focus that much on the content of the text message, as long as the content puts some pressure on the victim and the company name that is used as sender matches the victim’s profile they will click. The included hyperlinks are often not even masking the fact that it is an illicit webpage.

#12 Wireless and IoT threats 

Misconfiguration and Shadow IT will most certainly be the main problem posed for organisations and managing wireless security. Combined with the growing uptake of IoT devices, it’s easy to see how the new risks presented by reliance on wireless technologies will increase. Organizations need to apply the same security fundamentals to protect their wireless airspace and apply this to prevent hackers getting in. We shouldn’t assume someone else is taking care of the problem as it becomes a critical element of security.

Final words

2020 is set to bring a flurry of new challenges for security professionals, however it’s better to be prepared, taking a proactive approach and regain control of your threatscape before it becomes a problem. With increased legislation and compliance regulations coming into force, we at Outpost24 could help eliminate your security blindspots by providing continuous full stack assessment across network, device, application and cloud. Giving you time to focus on strategy, delivering ROI and helping to implement a security lead culture where all employees are accountable in delivering a secure future into the next decade.


 

GET STARTED WITH OUTPOST24

Looking for anything in particular?

Type your search word here