News

Cyber Security Predictions for 2022

  • None--securityboulevard.com
  • published date: 2021-11-29 00:00:00 UTC

None

<div class="bt_bb_wrapper"> <p><a href="https://www.k2io.com/wp-content/uploads/2021/11/closeup-developing-programming-coding-technologies-developer-working-web-sites-codes-office.jpg"><img loading="lazy" class="alignright size-full wp-image-3796" src="https://www.k2io.com/wp-content/uploads/2021/11/closeup-developing-programming-coding-technologies-developer-working-web-sites-codes-office.jpg" alt="" width="400" height="266" srcset="https://www.k2io.com/wp-content/uploads/2021/11/closeup-developing-programming-coding-technologies-developer-working-web-sites-codes-office.jpg 400w, https://www.k2io.com/wp-content/uploads/2021/11/closeup-developing-programming-coding-technologies-developer-working-web-sites-codes-office-320x213.jpg 320w" sizes="(max-width: 400px) 100vw, 400px"></a></p> <p>As we approach the end of 2021, all of us at K2 Cyber Security want to wish you and your families the best holiday season and new year, especially after the almost two years of living with the COVID-19 pandemic.  This last year was especially challenging as we finally developed a vaccine and thought things were getting back to normal, only to have repeated lockdowns and restrictions on travel.  On the IT front, organizations that were forced to <a href="https://www.k2io.com/consumption-of-public-cloud-is-way-ahead-of-ability-to-secure-it/">accelerate their digital transformation in 2020</a>, found they had to continue to rely on their cloud infrastructure as many of their employees continued to adapt and move to a hybrid work model. Many organizations found that the cyber criminals were working from home as diligently as they expected of their own employees.  All types of <a href="https://www.k2io.com/more-cyberattacks-in-the-first-half-of-2020-than-in-all-of-2019/">cyber attacks increased during the pandemic</a>.</p><div class="code-block code-block-4" style="margin: 8px 0; clear: both;"> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://www.techstrongevents.com/FinConDX" target="_blank"><img src="https://devops.com/wp-content/uploads/2021/12/fincon-dx.png" alt="FinConDX 2021"></a></div> <div class="clear-custom-ad"></div> </div></div> <p>With that backdrop, as we approach the end of 2021, we’d like to present our predictions for 2022 for the application security community.  It would be easy to just predict that cyber attacks will continue to increase, that we’ll find more vulnerabilities in production code (<a href="https://www.k2io.com/on-track-for-fifth-record-year-in-a-row-for-vulnerabilities/">after four record years and probably a fifth</a>), and that ransomware will exact a record-setting payment from an organization in the coming year.  Instead, we’ll focus on three predictions that are probably a little less likely, but ones we may still actually see come to pass in the coming year.</p> <p><strong><em>Prediction</em></strong><strong><em> #1: Even as attacks get more sophisticated, some of the worst breaches in 2022 are going to come from simpler, well-known vulnerability attack vectors.</em></strong></p> <p>We’ve seen well-known vulnerabilities continue to be exploited by attacks.  It’s why in the most recent <a href="https://www.k2io.com/owasp-working-group-releases-draft-of-top-10-web-application-risks-for-2021/">2021 revision of the OWASP Top 10 Web Application Risks</a>, common vulnerabilities like <a href="https://www.k2io.com/learning-more-about-sql-injection/">SQL Injection</a>, <a href="https://www.k2io.com/sql-injection-xss-and-rce-top-list-of-vulnerabilities-in-internet-facing-applications/">Remote Code Execution</a>, and <a href="https://www.k2io.com/learning-more-about-cross-site-scripting/">Cross Site Scripting</a> continue to be part of the list (even if they’ve been lumped into broader categories).  It’s the simple vulnerabilities that seem to continue to persist in code writing, and why organizations need to focus both on improving <a href="https://www.k2io.com/devops-vs-devsecops-what-is-the-difference/">DevSecOps</a> and <a href="https://www.k2io.com/what-is-rasp-and-why-should-you-care/">runtime application security</a>.</p> <p><strong><em>Prediction #2: With the rise of popularity of cryptocurrency, the major breach of 2022 will not be of data, but instead involve the loss of cryptocurrency.</em></strong></p> <p>With the rise of the popularity of cryptocurrency we’ve seen a number of new trading platforms launched, and the associated applications developed and released to support trading of cryptocurrency, payment by cryptocurrency, and savings accounts for cryptocurrency.  This rush to cash in on the fad of cryptocurrency almost guarantees that some corners were cut in application development, meaning there are bound to be some vulnerabilities out there waiting to be exploited.  We’ll be bold and predict that one of these applications will get exploited, leading to a major loss of cryptocurrency.</p> <p><strong><em>Prediction #3: We’ve seen the move to shift left, in the coming year we’ll see a move to shift right, where there will be an increased spend in securing applications running in production.</em></strong></p> <p>Many organizations rushed to “shift left” as that phrase gained popularity, moving security testing and secure coding earlier into application development.  Even as money poured into these areas, it was obvious that the focus on security for applications running in production seemed to wane in the past couple of years.  As attacks continue to increase, we predict that we’ll see an increase in spend on application security for applications running in production, essentially a shift back to the right.</p> <p><strong>Looking Forward to 2022</strong></p> <p>To sum up our predictions, 2022 will be the year that security comes back into focus (since some companies previously switched their IT personnel from security to enabling work-from-home) as a priority for organizations. Protecting the attack surface will regain attention, as attacks continue to increase. With the increase in attacks, the continued need for a hybrid worker, and the ongoing digital transformation of organizations around the world, application security will become a key focus in the coming year.</p> <p>To learn more about how to make your organization’s applications more secure for the coming year, <a href="https://www.k2io.com/~k2csecur/schedule-a-demo">request a demo</a>, or <a href="https://www.k2io.com/contact/">contact us for a meeting</a></p> <p> </p> <header> <hr> </header> <p> </p> <p><a href="https://k2io.com/schedule-a-demo/"><img loading="lazy" class="alignright wp-image-1300" src="https://www.k2io.com/wp-content/uploads/2020/03/Schedule-A-Demo.png" alt="" width="300" height="78" srcset="https://www.k2io.com/wp-content/uploads/2020/03/Schedule-A-Demo.png 510w, https://www.k2io.com/wp-content/uploads/2020/03/Schedule-A-Demo-320x83.png 320w" sizes="(max-width: 300px) 100vw, 300px"></a><a href="https://www.k2io.com/free-trial"><img loading="lazy" class="alignleft wp-image-1299" src="https://www.k2io.com/wp-content/uploads/2020/03/Get-A-Free-Trial.png" alt="" width="298" height="78" srcset="https://www.k2io.com/wp-content/uploads/2020/03/Get-A-Free-Trial.png 508w, https://www.k2io.com/wp-content/uploads/2020/03/Get-A-Free-Trial-320x84.png 320w" sizes="(max-width: 298px) 100vw, 298px"></a></p> <p> </p> </div><p>The post <a rel="nofollow" href="https://www.k2io.com/cyber-security-predictions-for-2022/">Cyber Security Predictions for 2022</a> appeared first on <a rel="nofollow" href="https://www.k2io.com/">K2io</a>.</p><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.k2io.com">K2io</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Pravin Madhani, CEO and Co-Founder">Pravin Madhani, CEO and Co-Founder</a>. Read the original post at: <a href="https://www.k2io.com/cyber-security-predictions-for-2022/">https://www.k2io.com/cyber-security-predictions-for-2022/</a> </p>