Technology Trends for 2024 (for True Epub) by Mike Loukides
Author:Mike Loukides
Language: eng
Format: epub
Publisher: O'Reilly Media, Inc.
Published: 2024-01-23T00:00:00+00:00
Figure 1-6. Security
Application security grew 42%, showing that software developers and operations staff are getting the message. The DevSecOps âshift leftâ movement, which focuses on software security early in the development process, appears to be winning; use of content about DevSecOps was up 30%. Similarly, those who deploy and maintain applications have become even more aware of their responsibilities. Developers may design identity and access management into the code, but operations is responsible for configuring these correctly and ensuring that access to applications is only granted appropriately. Security canât be added after the fact; it has to be part of the software process from beginning to the end.
Advanced persistent threats (APTs) were all over the news a few years ago. We donât see the term APT anywhere near as much as we used to, so weâre not surprised that usage has dropped by 35%. Nevertheless, nation-states with sophisticated offensive capabilities are very real, and cyber warfare is an important component of several international conflicts, including the war in Ukraine.
Itâs disappointing to see that usage of content about zero trust has declined by 20%. That decrease is more than offset by the increase in IAM, which is an essential tool for zero trust. But donât forget that IAM is just a tool and that the goal is to build systems that donât rely on trust, that always verify that every actor is appropriately identified and authorized. How can you defend your IT infrastructure if you assume that attackers already have access? Thatâs the question zero trust answers. Trust nothing; verify everything.
Finally, compliance is down 27%. Thatâs more than offset by the substantial increase of interest in governance. Auditing for compliance is certainly a part of governance. Focusing on compliance itself, without taking into account the larger picture, is a problem rather than a solution. Weâve seen many companies that focus on compliance with existing standards and regulations while avoiding the hard work of analyzing risk and developing effective policies for security. âIt isnât our fault that something bad happened; we followed all the rulesâ is, at best, a poor way to explain systemic failure. If that compliance-oriented mindset is fading, good riddance. Compliance, understood properly, is an important component of IT governance. Understood badly, compliance is an unacceptable excuse.
Finally, a word about a topic that doesnât yet appear in our data. There has, of course, been a lot of chatter about the use of AI in security applications. AI will be a great asset for log file analysis, intrusion detection, incident response, digital forensics, and other aspects of cybersecurity. But, as weâve already said, there are always two sides to AI. How does AI change security itself? Any organization with AI applications will have to protect them from exploitation. What vulnerabilities does AI introduce that didnât exist a few years ago? There are many articles about prompt injection, sneaky prompts designed to âjailbreakâ AI systems, data leakage, and other vulnerabilitiesâand we believe thatâs only the beginning. Securing AI systems will be a critical topic in the coming years.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Automotive | Aviation |
History | Mass Transit |
Owner's Manuals & Maintenance Guides | Railroads |
Reference | Ships |
Small Unmanned Fixed-wing Aircraft Design by Andrew J. Keane Andras Sobester James P. Scanlan & András Sóbester & James P. Scanlan(32338)
Navigation and Map Reading by K Andrew(4695)
Endurance: Shackleton's Incredible Voyage by Alfred Lansing(4101)
And the Band Played On by Randy Shilts(1802)
Wild Ride by Adam Lashinsky(1730)
The Box by Marc Levinson(1702)
Top 10 Prague (EYEWITNESS TOP 10 TRAVEL GUIDES) by DK(1671)
The Race for Hitler's X-Planes: Britain's 1945 Mission to Capture Secret Luftwaffe Technology by John Christopher(1601)
The One Percenter Encyclopedia by Bill Hayes(1558)
Girls Auto Clinic Glove Box Guide by Patrice Banks(1463)
Trans-Siberian Railway by Lonely Planet(1454)
Looking for a Ship by John McPhee(1416)
Batavia's Graveyard by Mike Dash(1407)
Fighting Hitler's Jets: The Extraordinary Story of the American Airmen Who Beat the Luftwaffe and Defeated Nazi Germany by Robert F. Dorr(1379)
Troubleshooting and Repair of Diesel Engines by Paul Dempsey(1360)
TWA 800 by Jack Cashill(1357)
Bligh by Rob Mundle(1355)
Ticket to Ride by Tom Chesshyre(1315)
The Great Halifax Explosion by John U. Bacon(1303)