15.11.2022 Views

CS Nov-Dec 2022

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2023 predictions<br />

PaaS, such as containers. Next generation<br />

XDR can take telemetry from assets like<br />

containers into a more modern Security<br />

Orchestration, Automation and Response<br />

(SOAR) platform. Tools such as these are<br />

becoming an increasingly critical function<br />

to support, secure and ultimately keep up<br />

with digital transformation."<br />

STEPHANIE BEST, DIRECTOR OF<br />

PRODUCT MARKETING, SALT SECURITY<br />

"2023 will be the year of API security. API<br />

traffic has increased 168% over the past year,<br />

with malicious traffic growing 117% in<br />

the same period. As business infrastructure<br />

increasingly moves towards digitalisation,<br />

API traffic, malicious and otherwise, will<br />

only continue to increase through 2023. If<br />

businesses are to protect themselves from<br />

the torrent of attacks coming their way,<br />

they must recognise the uniqueness of API<br />

security. Traditional security solutions, such<br />

as WAFs, API gateways and bot mitigation,<br />

simply aren't effective at protecting from<br />

most attacks aimed at APIs.<br />

"Attacks on APIs are typically 'low and slow',<br />

with attackers searching for unique business<br />

logic flaws for weeks or even months before<br />

they succeed. As these attacks aren't as overt<br />

as more traditional methods, they cannot be<br />

detected by security tools that are not APIspecific.<br />

What's more, basic security tools<br />

such as authentication, authorisation and<br />

encryption fail to meet the challenge of<br />

contemporary API security.<br />

"Businesses require deep, detailed context to<br />

understand and protect their API ecosystems<br />

- that means being able to distinguish<br />

normal API activity from anomalies amidst<br />

millions of API calls. Basic security tools just<br />

don't provide that context, leaving businesses<br />

at risk.<br />

"While it's not certain that businesses will<br />

wise up to the importance of API security,<br />

attacks on APIs will certainly increase.<br />

Just this year, Australian telco giant Optus<br />

suffered an API security incident with<br />

catastrophic results. The breach resulted<br />

directly from broken user authentication, the<br />

second biggest API vulnerability, according to<br />

the OWASP API Security Top 10.<br />

"Attackers know that they can easily exfiltrate<br />

data from unauthenticated APIs. With an API<br />

security platform able to provide continuous<br />

visibility in runtime and show the normal<br />

behaviours of APIs versus anomalies, this<br />

threat could have been identified before<br />

the attacker accessed the user data. If<br />

organisations don't learn from Optus's<br />

mistakes, 2023 will be riddled with major<br />

API security failures. In short, 2023 is either<br />

going to be the year of API security or API<br />

security incidents. The end result will be<br />

determined by whether businesses wise up<br />

to the need for API-specific security or<br />

continue to rely on old security solutions for<br />

a very modern problem.<br />

JOHN GOODACRE, DIRECTOR OF THE<br />

UKRI'S DIGITAL SECURITY BY DESIGN<br />

CHALLENGE AND PROFESSOR OF<br />

COMPUTER ARCHITECTURES AT<br />

MANCHESTER UNIVERSITY<br />

"As we head into 2023, the financial impact<br />

of cybercrime is heading towards the $10<br />

trillion mark, with no signs of slowing. As<br />

our world becomes ever more connected<br />

and dependent on technology, the<br />

traditional approach to cyber security<br />

of cleanliness and the rush to patch will<br />

continue to struggle to keep up. The<br />

doom-and-gloom headlines will continue<br />

to be written about data loss and a lack of<br />

resilience or trust from an ever-increasing<br />

breadth of cyber-attack across the digital<br />

world.<br />

"IT teams and users alike are already<br />

stretched to the limit, many acknowledging<br />

that they do not have the skills or time to<br />

keep up with the almost weekly attempted<br />

attacks and zero-day patches. Simply<br />

monitoring for and patching vulnerabilities<br />

that are discovered at the user level is not<br />

a battle that can be won by the defenders,<br />

especially when attackers only need to be<br />

right once to exploit a vulnerability.<br />

"The UK is seeking to do something about<br />

this to balance responsibility across the<br />

supply chain. Already in <strong>2022</strong>, we have seen<br />

the Government's PSTI Bill looking to ensure<br />

that consumer products are shipped more<br />

securely by default, placing more<br />

responsibility on the product manufacturer.<br />

"The UK Government is not stopping here,<br />

though. As part of the UK's National Cyber<br />

Strategy, there is now a focus on the underlying<br />

technology that our digital world is<br />

built upon, ensuring products are not only<br />

secured by default to help reduce the<br />

number of vulnerabilities, but also secured<br />

by design of the components and enabling<br />

technologies to help protect against the<br />

inevitable remaining vulnerabilities.<br />

"UK Research and Innovation's Digital<br />

Security by Design Programme, part of<br />

the National Cyber Strategy, has been<br />

redesigning from the ground up the way<br />

software interacts with hardware, so it can<br />

block the exploitation of around 70% of<br />

the ongoing discovered vulnerabilities<br />

by design, while also enabling software<br />

development new ways to maintain<br />

resilience and integrity. Working across<br />

government, industry and academia, the<br />

£300m programme has been distributing a<br />

prototype, with developers and researchers<br />

finding more ways to protect everything<br />

digital from cyber and operational incidents.<br />

"As we move into 2023, we will really start<br />

to see early examples for sectors where this<br />

innovative technology can reduce threats<br />

and block exploitation of vulnerabilities.<br />

Developers and IT teams will become more<br />

vocal, pressing for the day they can benefit<br />

from new hardware that can actively block<br />

exploitation of vulnerabilities and their need<br />

to chase the ever-increasing number<br />

of patches."<br />

14<br />

computing security <strong>Nov</strong>/<strong>Dec</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!