Critical firewall vulnerabilities will continue to be ignored. Chris Morales, head of security analytics at Vectra Networks, said the firewall is the most trusted device in a data center. The Shadow Brokers’ treasure trove of exploits stolen from the Equation Group was a wake-up call that advanced adversaries and nation-states had access to tools that provide access to eavesdrop on even encrypted communications traversing firewalls. According to the Shadow Server website, there are still more than 816,000 Cisco firewalls connected to the internet that are vulnerable, undermining the inherent trust placed in firewalls.
Services instead of products. The security industry will accelerate the development of service-based offerings, offering packaged services rather than simply selling hardware, according to Monica Hallin, CEO of Vindico Group. Security companies will need to be flexible and agile in a time of great and rapid changes in the world and the industry. These changes increase the demand for new products and services. Security providers who lack the ability to rapidly change their businesses and offerings will face a difficult time. Even customers need to manage their risks and track their incidents more often, and be much quicker to revise and adapt to their needs.
Phishing still on the hook. “Phishing will continue to be the number one attack vector for spoofing, malware and other malicious activity," says Ng. "Email, both personal and corporate, continue to be used at various enterprises with very little oversight. We will see attackers utilizing various email framework protocols to launch attacks that cause data breaches well into the next five years.”
More bug bounties. “We will see a large trend of organizations offering bug bounties for vulnerabilities, which will offset the cost of selling the same vulnerability on the dark web," Ng adds. "Companies will be more open and transparent in their vulnerabilities and encourage attackers to break them.”
Sign up for Computerworld eNewsletters.