Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/23/2019
10:30 AM
Daniel Kanchev
Daniel Kanchev
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

2020 & Beyond: The Evolution of Cybersecurity

As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.

Cybersecurity should be top of mind for any Internet user, professional or otherwise. But security is a process, not a goal, and web developers, DevOps professionals, and security professionals alike need to be informed of changing industry standards as we head into the new decade. The Internet might have become safer in 2019, but there's still more to do. Here's a sneak preview of the changes and innovations coming to the world of cybersecurity in 2020.

First things first — old encryption protocols will fade away. Given that all major browsers now support TLS 1.3, and the increase of the websites using SSL certificates has been huge in the past years, it's logical to expect that by next year, over 90% of traffic will move to the latest Transport Layer Security update, TLS 1.3. TLS provides secure communication between entities, and TLS 1.3 makes these connections take place more efficiently and safely, something that cannot be overlooked when it comes to securing any website.

It's no secret that past encryption protocols are more susceptible to attacks, and even though some of those attacks are extremely difficult to implement, it is arguably safer for systems to be upgraded to the latest TLS versions whenever possible. It should be noted, though, that most of the attacks targeting the TLS protocol focus on finding hash function collisions.

As we move into the new decade, the majority of web hosting companies will announce support for new protocols such as Quick UDP Internet Connections (QUIC), a general-purpose transport layer network. QUIC provides built-in security and performance features like authentication and encryption that are usually provided by higher-layer protocols. By replacing the TLS record layer with its own framing, QUIC ensures quick connections, no pun intended, all while maintaining authentication and encryption — two things that all Internet users benefit from.

The newest version of the HTTP protocol (HTTP/3) is based on QUIC. HTTP/3 is faster than its predecessors because it skips all the packets exchanged between browsers and servers to establish a secure TCP + TLS connection. Secure connections are the lifeline of the Internet, so it's no surprise that developers will be striving to create the safest environment possible.

Next, DevOps and DevSecOps professionals will continue to focus on continuous integration and continuous deployment. These innovations will accelerate the feedback loop with customers and take the pressure off of development teams meeting hard deadlines as all changes are immediately released to customers as long as no production test flags an error. The best part? There's no human intervention required, a significant shift from the tedious updates previously required to fix security issues. With releases happening automatically, software developers can focus on building the best products they can.

Additionally, functions-as-a-service will remove huge overhead from developers.

In late November, RIPE NCC ran out of IPV4 addresses, showing that the time to adopt IPv6 is here. Many people still confuse IPv6 as just an updated IPv4 — this is incorrect. IPv6 is not just IPv4 with longer address space; it also offers new attributes for addresses as well as many more things. For example, a single interface can have multiple IPv6 addresses and those addresses can change over time. The adoption of IPv6 will increase and with that happening in the near future network and systems architects will have to get more familiar with the IPv6 vulnerability surface.

Finally, the adoption of DNSSec will increase, requiring systems administrators and developers to better understand the complexities of the system. Essentially, DNS is the phone book of the Internet. The DNS system is used by all applications on the Web — think sites, mail servers, browsers, etc., to find out how information should be routed. The problem with DNS is that it offers no authentication mechanisms, thus, records can be changed and traffic can be intercepted by attackers. DNSSec adds a layer of security on top of DNS. It guarantees users that the DNS records they're receiving and sending are the real ones that should be used.

The next decade will be a momentous one for cybersecurity innovation from small businesses to big corporations — it's no shock that security will play a key role in the future of the Internet. As new technologies continue to disrupt the industry, it's important to remember that security is a process, not a goal; everyone should take the time to educate themselves on how they can best secure their corner of the Web.

Related Content:
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff."
 

Daniel leads the enterprise hosting team at SiteGround. He is responsible for developing, shipping, and monitoring complex cloud-hosting solutions for WordPress and other open source systems and for clients with custom requirements or large-scale websites. With over 10 years' ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jaguarspids
50%
50%
jaguarspids,
User Rank: Apprentice
12/29/2019 | 7:22:55 AM
Quick UDP Internet Connections (QUIC)
As we move into the new decade, the majority of web hosting companies will announce support for new protocols such as Quick UDP Internet Connections (QUIC), a general-purpose transport layer network. QUIC provides built-in security and performance features like authentication and encryption that are usually provided by higher-layer protocols. By replacing the TLS record layer with its own framing, QUIC ensures quick connections, no pun intended, all while maintaining authentication and encryption — two things that all Internet users benefit from.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:54:24 PM
DNSSecure
DNSSec adds a layer of security on top of DNS. Yes, this is another advancement we need certainly. Another good news.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:52:48 PM
Secure HTTP
The newest version of the HTTP protocol (HTTP/3) is based on QUIC I think this is very helpful, we need to make internet protocol secure by default.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:51:19 PM
TLS 1.3
Given that all major browsers now support TLS 1.3, Glad to see TLS 1.3 is becoming default encryption method, we really need to go beyond SSL.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:49:13 PM
Re: Cybersecurity
Yes, I like it too. Also just to add, IPv6 has better security then IPv4, so IPv6 should be the default choice.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:47:49 PM
Not a goal
But security is a process, not a goal, and web developers Security has to be an ongoing keeping up with the technological changes and threats. Not a spot in a timeline it is a process.
Wings2i
50%
50%
Wings2i,
User Rank: Apprentice
12/27/2019 | 11:15:34 AM
Cybersecurity
Interesting read on what the future has in store for Cybersecurity
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9024
PUBLISHED: 2020-02-17
Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have world-writable permissions for the /root/cleardata.pl (executed as root by crond) and /root/loadperl.sh (executed as root at boot time) scripts.
CVE-2020-9025
PUBLISHED: 2020-02-17
Iteris Vantage Velocity Field Unit 2.4.2 devices have multiple stored XSS issues in all parameters of the Start Data Viewer feature of the /cgi-bin/loaddata.py script.
CVE-2020-9026
PUBLISHED: 2020-02-17
ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the PING field of the resource ping.cmd. The NTP-2 device is also affected.
CVE-2020-9027
PUBLISHED: 2020-02-17
ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the TRACE field of the resource ping.cmd. The NTP-2 device is also affected.
CVE-2020-9028
PUBLISHED: 2020-02-17
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow stored XSS via the newUserName parameter on the "User Creation, Deletion and Password Maintenance" screen (when creating a new user).