News

1/11/2019
01:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

6 Serverless and Containerization Trends CISOs Should Track

Security leaders must stay on top of a fast-moving world of cloud deployment options.
Previous
1 of 7
Next

Image Source: Envato Elements

Image Source: Envato Elements

Cloud deployments are not only growing in complexity, but they are way more integral to the delivery of business-critical technology – so much so that they make early cybersecurity challenges from software-as-a-service (SaaS) apps seem quaint in comparison. As developers, testers, and operations staff speed along with continuous delivery/continuous integration (CI/CD) efforts, the use of containers and serverless technology is skyrocketing. With it brings plenty of new impending security issues.

"Serverless computing, often called 'function as a service,' will create massive security headaches in 2019, especially when it comes to identifying and protecting assets," predicts Bob Huber, chief security officer at Tenable. "While serverless computing is a great way to reduce the burden of infrastructure management on developers, it also creates a lack of ownership and visibility into environments."

The same goes for containers and containerization orchestration and automation tools like Kubernetes, Amazon ECS, and Docker Swarm. And while some people have previously debated whether serverless technology would take over containerization momentum, the truth is they're actually complementary, says Rani Osnat, vice president of product marketing at Aqua Security.

"It's not even a two-horse race. There's a whole range of deployment modalities that include serverless functions, serverless containers – for example, AWS Fargate and Azure Container Instances – containers, various hybrids like AWS Firecracker, or sandboxing technologies like Google gVisor and Kata Containers,” Osnat says. "We will see increasingly composite architectures that blend these mechanisms to optimize performance, scale, and cost."

With such rapid adoption and fast-changing technology, CISOs will need to stay on top of these trends to effectively manage the new risks they'll increasingly bring in the coming year.

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9962
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to VCRUNTIME140!memcpy.
CVE-2019-9963
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlFreeHeap.
CVE-2019-9964
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlpNtMakeTemporaryKey.
CVE-2019-9965
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlReAllocateHeap.
CVE-2019-9966
PUBLISHED: 2019-03-24
XnView Classic 2.48 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to xnview+0x38536c.