Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/23/2019
10:30 AM
Daniel Kanchev
Daniel Kanchev
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

2020 & Beyond: The Evolution of Cybersecurity

As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.

Cybersecurity should be top of mind for any Internet user, professional or otherwise. But security is a process, not a goal, and web developers, DevOps professionals, and security professionals alike need to be informed of changing industry standards as we head into the new decade. The Internet might have become safer in 2019, but there's still more to do. Here's a sneak preview of the changes and innovations coming to the world of cybersecurity in 2020.

First things first — old encryption protocols will fade away. Given that all major browsers now support TLS 1.3, and the increase of the websites using SSL certificates has been huge in the past years, it's logical to expect that by next year, over 90% of traffic will move to the latest Transport Layer Security update, TLS 1.3. TLS provides secure communication between entities, and TLS 1.3 makes these connections take place more efficiently and safely, something that cannot be overlooked when it comes to securing any website.

It's no secret that past encryption protocols are more susceptible to attacks, and even though some of those attacks are extremely difficult to implement, it is arguably safer for systems to be upgraded to the latest TLS versions whenever possible. It should be noted, though, that most of the attacks targeting the TLS protocol focus on finding hash function collisions.

As we move into the new decade, the majority of web hosting companies will announce support for new protocols such as Quick UDP Internet Connections (QUIC), a general-purpose transport layer network. QUIC provides built-in security and performance features like authentication and encryption that are usually provided by higher-layer protocols. By replacing the TLS record layer with its own framing, QUIC ensures quick connections, no pun intended, all while maintaining authentication and encryption — two things that all Internet users benefit from.

The newest version of the HTTP protocol (HTTP/3) is based on QUIC. HTTP/3 is faster than its predecessors because it skips all the packets exchanged between browsers and servers to establish a secure TCP + TLS connection. Secure connections are the lifeline of the Internet, so it's no surprise that developers will be striving to create the safest environment possible.

Next, DevOps and DevSecOps professionals will continue to focus on continuous integration and continuous deployment. These innovations will accelerate the feedback loop with customers and take the pressure off of development teams meeting hard deadlines as all changes are immediately released to customers as long as no production test flags an error. The best part? There's no human intervention required, a significant shift from the tedious updates previously required to fix security issues. With releases happening automatically, software developers can focus on building the best products they can.

Additionally, functions-as-a-service will remove huge overhead from developers.

In late November, RIPE NCC ran out of IPV4 addresses, showing that the time to adopt IPv6 is here. Many people still confuse IPv6 as just an updated IPv4 — this is incorrect. IPv6 is not just IPv4 with longer address space; it also offers new attributes for addresses as well as many more things. For example, a single interface can have multiple IPv6 addresses and those addresses can change over time. The adoption of IPv6 will increase and with that happening in the near future network and systems architects will have to get more familiar with the IPv6 vulnerability surface.

Finally, the adoption of DNSSec will increase, requiring systems administrators and developers to better understand the complexities of the system. Essentially, DNS is the phone book of the Internet. The DNS system is used by all applications on the Web — think sites, mail servers, browsers, etc., to find out how information should be routed. The problem with DNS is that it offers no authentication mechanisms, thus, records can be changed and traffic can be intercepted by attackers. DNSSec adds a layer of security on top of DNS. It guarantees users that the DNS records they're receiving and sending are the real ones that should be used.

The next decade will be a momentous one for cybersecurity innovation from small businesses to big corporations — it's no shock that security will play a key role in the future of the Internet. As new technologies continue to disrupt the industry, it's important to remember that security is a process, not a goal; everyone should take the time to educate themselves on how they can best secure their corner of the Web.

Related Content:
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff."
 

Daniel leads the enterprise hosting team at SiteGround. He is responsible for developing, shipping, and monitoring complex cloud-hosting solutions for WordPress and other open source systems and for clients with custom requirements or large-scale websites. With over 10 years' ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Wings2i
50%
50%
Wings2i,
User Rank: Apprentice
12/27/2019 | 11:15:34 AM
Cybersecurity
Interesting read on what the future has in store for Cybersecurity
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:47:49 PM
Not a goal
But security is a process, not a goal, and web developers Security has to be an ongoing keeping up with the technological changes and threats. Not a spot in a timeline it is a process.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:49:13 PM
Re: Cybersecurity
Yes, I like it too. Also just to add, IPv6 has better security then IPv4, so IPv6 should be the default choice.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:51:19 PM
TLS 1.3
Given that all major browsers now support TLS 1.3, Glad to see TLS 1.3 is becoming default encryption method, we really need to go beyond SSL.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:52:48 PM
Secure HTTP
The newest version of the HTTP protocol (HTTP/3) is based on QUIC I think this is very helpful, we need to make internet protocol secure by default.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2019 | 3:54:24 PM
DNSSecure
DNSSec adds a layer of security on top of DNS. Yes, this is another advancement we need certainly. Another good news.
jaguarspids
50%
50%
jaguarspids,
User Rank: Apprentice
12/29/2019 | 7:22:55 AM
Quick UDP Internet Connections (QUIC)
As we move into the new decade, the majority of web hosting companies will announce support for new protocols such as Quick UDP Internet Connections (QUIC), a general-purpose transport layer network. QUIC provides built-in security and performance features like authentication and encryption that are usually provided by higher-layer protocols. By replacing the TLS record layer with its own framing, QUIC ensures quick connections, no pun intended, all while maintaining authentication and encryption — two things that all Internet users benefit from.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15570
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
CVE-2020-15569
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
CVE-2020-7690
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
CVE-2020-7691
PUBLISHED: 2020-07-06
It's possible to use <<script>script> in order to go over the filtering regex.
CVE-2020-15562
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.