Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/29/2010
10:46 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Information Security Predictions 2011

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).Prediction Number 1: Hackers Get Back To Basics. There are two trends that will come into play and full fruition in the next year that will force hackers back to the basics. First, the current enterprise defenses organizations employ: intrusion detection systems, firewalls, content filtering, data leak prevention, and especially anti-virus software become so effective that many of the less skilled attackers just can't get through them anymore. Second, a global law enforcement crackdown on criminal hacking turns out to be extremely successful.

All of this means that hackers who really aren't any good get discouraged - and just stop hacking- toward the second half of next year. Those criminal hackers who are good enough at their craft to make a living are all arrested and imprisoned. The result: those who are left bring hacking back to the golden age of cracking networks for the joy and mischief of it all.

Prediction Number 2: Cyberwar is obsolete before it gets started. Nations realize that no matter how well equipped their offensive cyber warfare capabilities become - they can't adequately defend their networks, data, and critical infrastructure from the attack of others. Most every nation agrees to enter into a cyber warfare treaty that outlaws nation-backed attacks on the critical infrastructure of other nations. Overall, the treaty is viewed by the world as a great success. However there is a serious increase in the Chinese unemployment rate as a result of the treaty. This is solved when Google hires the unemployed Chinese hackers to develop cool new beta applications as long as they agree to stop attacking the search engine giant.

Prediction Number 3: Zero-defect ultra-secure code becomes attainable. An application security vendor develops a secure coding framework that works with all development languages. When laying this framework on top of the development environment, all security related business logic and coding errors are flagged and code can't be compiled until properly remedied. Administrators around the globe cheer that they finally get their second Tuesday of every month back. Adobe and Microsoft stock soars.

Prediction Number 4: Security industry moves from FUD to data. That's right: The language of Fear, Uncertainty, and Doubt is replaced by the language of science. Enterprises start analyzing the security related data they have, and start gathering more difficult to obtain data. Organizations start to study and share this data. The data is turned into useful information. They begin to test their hypothesis about which security practices work, and which do not. By 2013 the amount of budget spent annually on information security plummets by 55 percent while the security for most organizations rises exponentially.

Prediction Number 5: Operating System Stupid User Behavior Parser. One of the major operating systems becomes equipped with a Stupid User Behavior Parser, of SUBP. SUBP identifies links, files, applications, and web sites that the user shouldn't engage and blocks the user from being able to make the mistakes that jeopardize the security of their systems.

For my security and technology observations throughout the day, find me on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...