CS Nov-Dec 2022
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
2023 predictions<br />
PaaS, such as containers. Next generation<br />
XDR can take telemetry from assets like<br />
containers into a more modern Security<br />
Orchestration, Automation and Response<br />
(SOAR) platform. Tools such as these are<br />
becoming an increasingly critical function<br />
to support, secure and ultimately keep up<br />
with digital transformation."<br />
STEPHANIE BEST, DIRECTOR OF<br />
PRODUCT MARKETING, SALT SECURITY<br />
"2023 will be the year of API security. API<br />
traffic has increased 168% over the past year,<br />
with malicious traffic growing 117% in<br />
the same period. As business infrastructure<br />
increasingly moves towards digitalisation,<br />
API traffic, malicious and otherwise, will<br />
only continue to increase through 2023. If<br />
businesses are to protect themselves from<br />
the torrent of attacks coming their way,<br />
they must recognise the uniqueness of API<br />
security. Traditional security solutions, such<br />
as WAFs, API gateways and bot mitigation,<br />
simply aren't effective at protecting from<br />
most attacks aimed at APIs.<br />
"Attacks on APIs are typically 'low and slow',<br />
with attackers searching for unique business<br />
logic flaws for weeks or even months before<br />
they succeed. As these attacks aren't as overt<br />
as more traditional methods, they cannot be<br />
detected by security tools that are not APIspecific.<br />
What's more, basic security tools<br />
such as authentication, authorisation and<br />
encryption fail to meet the challenge of<br />
contemporary API security.<br />
"Businesses require deep, detailed context to<br />
understand and protect their API ecosystems<br />
- that means being able to distinguish<br />
normal API activity from anomalies amidst<br />
millions of API calls. Basic security tools just<br />
don't provide that context, leaving businesses<br />
at risk.<br />
"While it's not certain that businesses will<br />
wise up to the importance of API security,<br />
attacks on APIs will certainly increase.<br />
Just this year, Australian telco giant Optus<br />
suffered an API security incident with<br />
catastrophic results. The breach resulted<br />
directly from broken user authentication, the<br />
second biggest API vulnerability, according to<br />
the OWASP API Security Top 10.<br />
"Attackers know that they can easily exfiltrate<br />
data from unauthenticated APIs. With an API<br />
security platform able to provide continuous<br />
visibility in runtime and show the normal<br />
behaviours of APIs versus anomalies, this<br />
threat could have been identified before<br />
the attacker accessed the user data. If<br />
organisations don't learn from Optus's<br />
mistakes, 2023 will be riddled with major<br />
API security failures. In short, 2023 is either<br />
going to be the year of API security or API<br />
security incidents. The end result will be<br />
determined by whether businesses wise up<br />
to the need for API-specific security or<br />
continue to rely on old security solutions for<br />
a very modern problem.<br />
JOHN GOODACRE, DIRECTOR OF THE<br />
UKRI'S DIGITAL SECURITY BY DESIGN<br />
CHALLENGE AND PROFESSOR OF<br />
COMPUTER ARCHITECTURES AT<br />
MANCHESTER UNIVERSITY<br />
"As we head into 2023, the financial impact<br />
of cybercrime is heading towards the $10<br />
trillion mark, with no signs of slowing. As<br />
our world becomes ever more connected<br />
and dependent on technology, the<br />
traditional approach to cyber security<br />
of cleanliness and the rush to patch will<br />
continue to struggle to keep up. The<br />
doom-and-gloom headlines will continue<br />
to be written about data loss and a lack of<br />
resilience or trust from an ever-increasing<br />
breadth of cyber-attack across the digital<br />
world.<br />
"IT teams and users alike are already<br />
stretched to the limit, many acknowledging<br />
that they do not have the skills or time to<br />
keep up with the almost weekly attempted<br />
attacks and zero-day patches. Simply<br />
monitoring for and patching vulnerabilities<br />
that are discovered at the user level is not<br />
a battle that can be won by the defenders,<br />
especially when attackers only need to be<br />
right once to exploit a vulnerability.<br />
"The UK is seeking to do something about<br />
this to balance responsibility across the<br />
supply chain. Already in <strong>2022</strong>, we have seen<br />
the Government's PSTI Bill looking to ensure<br />
that consumer products are shipped more<br />
securely by default, placing more<br />
responsibility on the product manufacturer.<br />
"The UK Government is not stopping here,<br />
though. As part of the UK's National Cyber<br />
Strategy, there is now a focus on the underlying<br />
technology that our digital world is<br />
built upon, ensuring products are not only<br />
secured by default to help reduce the<br />
number of vulnerabilities, but also secured<br />
by design of the components and enabling<br />
technologies to help protect against the<br />
inevitable remaining vulnerabilities.<br />
"UK Research and Innovation's Digital<br />
Security by Design Programme, part of<br />
the National Cyber Strategy, has been<br />
redesigning from the ground up the way<br />
software interacts with hardware, so it can<br />
block the exploitation of around 70% of<br />
the ongoing discovered vulnerabilities<br />
by design, while also enabling software<br />
development new ways to maintain<br />
resilience and integrity. Working across<br />
government, industry and academia, the<br />
£300m programme has been distributing a<br />
prototype, with developers and researchers<br />
finding more ways to protect everything<br />
digital from cyber and operational incidents.<br />
"As we move into 2023, we will really start<br />
to see early examples for sectors where this<br />
innovative technology can reduce threats<br />
and block exploitation of vulnerabilities.<br />
Developers and IT teams will become more<br />
vocal, pressing for the day they can benefit<br />
from new hardware that can actively block<br />
exploitation of vulnerabilities and their need<br />
to chase the ever-increasing number<br />
of patches."<br />
14<br />
computing security <strong>Nov</strong>/<strong>Dec</strong> <strong>2022</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk