6 Information Security predictions from Gartner researchers for 2023
Cyber dangers are constantly evolving. Organizations need to be ready for an increase in cyber threats given the ongoing Russia-Ukraine conflict and the anticipated economic uncertainties.
Top Gartner experts recently decided to offer their most important cybersecurity forecasts for 2023. Supply line and geopolitical risk were expected to continue, DevSecOps would become a crucial approach for security firms and programmers, and human-developed ransomware would continue to be a significant concern.
Their comments are provided below:
1. Cybersecurity will be influenced by supply chain and geopolitical risk:
“A wide range of geopolitical risks continue to have an impact on enterprises globally, and many of them will become supply chain vulnerabilities in 2023. Partners and trustworthy third parties are impacted by the pandemic, social and political polarisation, issues with digital ethics and privacy, and climate change. “This increases the risk of malware assaults, attacks on cloud computing, attacks on the availability and integrity of systems, such as data loss or theft for businesses and their supply chains.
“Effective security controls must be incorporated by organizations to address any supply chain hazards they may encounter. Cybersecurity concerns in the supply chain must be dealt with in 2023 as a social and technical issue.
These risks stem from issues with acquiring hardware and software, business continuity, and transportation issues rather than being primarily IT security vulnerabilities.
2. New architectural styles will simplify security:
“To prioritize risks and solve them, security teams must be able to continuously identify gaps brought on by either new IT initiatives, such as shifting to the cloud or using container technologies more frequently, or emerging attacks. “Big security providers are developing consolidated cybersecurity systems known as cybersecurity mesh architectures, described by their underlying data lake-oriented features” (CSMAs). With the use of integrated machine learning (ML), orchestration, and automation, as well as support for third-party integration, these solutions seek to build a single console.
3. Risk management will heavily rely on zero trust:
“Zero-trust architecture (ZTA), according to Gartner, is defended as an ‘architecture that substitutes implicit trust with consistently assessed risk and trust levels based upon identity and situation that adapts to risk-optimize the overall security.’ As a result, any request to use a ZTA resource must include a risk assessment, and trust must be clear.
The risk estimate takes into account several signals, including device location, user assertion plausibility, threat intelligence, time of day, day of the week, and the application’s request’s data sensitivity.
Only when the calculated risk is smaller than the value of expanding the access is access allowed. ZTA will be used by businesses more frequently in 2023 to improve and risk-optimize their overall security posture.
4. Companies will require DevSecOps:
“Malicious actors are developing a wide range of attack surfaces thanks to the ongoing growth and diversity of API and application installations.
“Therefore, organizations must view the secure creation and deployment of APIs and apps as a business imperative. Security must be automated into application delivery processes utilizing DevSecOps methodologies to accomplish this efficiently without slowing down velocity. “The distinction between infrastructure and apps is blurred by DevSecOps. Considerations for application and data security go hand in hand with those for infrastructure security, as security teams will discover. The development pipeline, a crucial link in the supply chain for software, serves as a good illustration.
“Attackers are using flaws in this crucial component to access application components, sensitive data, and source code. For a comprehensive DevSecOps approach in 2023, security teams will increasingly align security and DevOps processes. Activities for developing software and automating processes must incorporate security.
5. Human-developed ransomware will grow in importance as a menace.
Human-developed ransomware is turning become an unavoidable problem as more, more sophisticated attacks continue to appear. Security teams must modify their defence measures in response to the increasingly complex techniques used by these ransomware groups.
“The majority of prevention occurs during the preattack and peri-attack phases of a ransomware attack. “Detection controls become crucial to spotting unusual attacker actions once the attacker has successfully entered.
6. A “data everywhere” world will require data-centric cybersecurity.
Data is spreading both inside and outside the institutions that gather it and initially bear the burden of keeping it secure. There is virtually little visibility into this data since many firms have not made keeping track of it a major priority.
Dark data is defined as “stored data that the business has no visibility into. Estimates range from 55% to over 80% of the data that an organization has as being dark. Unknown data threats are lurking in this dark data. “Data security and privacy compliance inside big data/advanced analytics pipelines are of increasing concern, particularly where rules may directly conflict with the objectives of the business. In today’s “always on,” “data everywhere” era, data-centric security is crucial for data protection. Organizations must concentrate on adding a data-centric perspective to their basic security architecture by 2023.