[Infowarrior] - Looking ahead at security trends for 2009
Richard Forno
rforno at infowarrior.org
Tue Dec 23 21:10:39 UTC 2008
Looking ahead at security trends for 2009
Posted by Jon Oltsik
http://news.cnet.com/8301-1009_3-10128133-83.html?part=rss&subj=news&tag=2547-1_3-0-20
In spite of the global economic recession, information security will
continue to be a dominant IT priority in 2009. Why? There are simply
too many threats and vulnerabilities creating a perpetual increase in
IT risk.
With that, here is my top-10 list (in no particular order) of
technologies and trends to watch for in the new year:
1. The evolving definition of endpoint security: Some analysts have
declared that, antivirus software is dead. I disagree and submit that
endpoint security is simply evolving as a function of the changing
threat landscape. This is the primary reason why Sophos (a legacy
antivirus company) bought Utimaco (a data security company) in 2008.
Look for traditional antivirus, anti-spyware, and firewall software to
merge with endpoint operations, data loss prevention, and full-disk
encryption in 2009.
2. More emphasis on cybersecurity: This year began with the
establishment of the Comprehensive National Cybersecurity Initiative
(CNCI), an effort to strengthen government networks. While well-
intended, CNCI has received minimal funding and support. In December,
a Center for Strategic and International Studies report, further
described the sorry state of cybersecurity and called for drastic
improvements. Look for President-elect Barack Obama to get behind this
effort in a big way with funding, a real public/private partnership,
and cooperative intelligence and law enforcement with a growing list
of foreign nations.
3. Increasingly stringent privacy legislation: Privacy advocates like
the American Civil Liberties Union and the Center for Democracy and
Technology are hopeful that the change in administration will finally
lead to more comprehensive national privacy legislation in 2009 and
beyond. This momentum should persuade the Senate to finally push the
Personal and Data Privacy Act of 2007 (S.495), which has been dormant
since May. In the meantime, look for states like Michigan and
Washington to follow the lead of Massachusetts and Nevada in mandating
data encryption.
4. Security in the cloud: While "cloud" has turned into a vague
industry security blanket term, I do believe that 2009 will be a
strong year for managed security services. Many organizations simply
don't have the capital budget dollars or security skills to take on
the increasingly sophisticated bad guys themselves--good news for IBM
and Symantec. Additionally, companies like Blue Coat, Cisco, and Trend
Micro will supplement on-site security equipment with scalable
reputation and update services in the cloud.
5. Virtualization security: As server and desktop virtualization
continues to proliferate, we will need better security tools for
things like role-based access control, virtual server identity
management, virtual network security, and reporting/auditing. Citrix,
Microsoft, and VMware will lead this effort with partnering support
from others like IBM (Project Phantom), McAfee, and Q1 Labs.
6. Secure software development: In 2008, the majority of malicious
code attacks targeted applications, not operating systems. This fact
combined with growing focus on cybersecurity will force software
companies to embrace secure software development efforts such as the
Open Web Application Security Project (OWASP) or the SANS Software
Security Institute. Ironically, Microsoft and its Pro Network partners
like Security Innovation are best positioned to bring secure software
development best practices to the masses.
7. Information-centric security: The recent Microsoft/RSA announcement
is a sign of things to come. Organizations large and small need to be
able to discover and classify sensitive information, apply security
policies, and then enforce these policies throughout the network. This
will continue to become a reality in 2009 as documents and file
systems are integrated with data loss prevention and enterprise rights
management systems. Look for further progress like the introduction of
PKI in the mix along with discussions about metadata standards for
data classification and security rules enforcement.
8. Ubiquitous encryption: Encryption technologies are more often
becoming "baked in" rather than "bolted on." Tape drives now contain
cryptographic processors as do hard drives from Fujitsu, Hitachi, and
Seagate. And Intel will ship a version of its vPro chip set in 2009
that also supports on-board encryption. In 2009, we will start to see
multiple layers of encryption technologies running on top of each
other. Good for data confidentiality and integrity but this will also
highlight the need for enterprise-class encryption key management--
another technology on the 2009 "watch list."
9. Entitlement management: Authentication gets you in the network
door, while entitlement management governs what you can and can't do.
Entitlement management is currently done on an application-by-
application basis but this doesn't scale, is ripe for human error, and
is nearly impossible to audit for compliance. Enter centralized
entitlement management brought to you by Cisco, IBM/Tivoli, Rohati,
and RSA Security. Look for lots of buzz as well as pilot projects by
the summer. By the end of 2009, IT professionals should be intimately
familiar with XACML (XML Access Control Markup Language).
10. Business process security: Securing all IT assets across the
enterprise is a daunting task--too big for risk-averse business
managers. Rather than rely on IT reports and security point tools
alone, line-of-business executives will want more visibility and
oversight into their exclusive domains with detailed and succinct
portals, reports, and auditing systems. Ultimately, CEOs will support
this effort as it forces individual business units to build security
into their P&Ls. This trend favors big services vendors like
Accenture, CSC, and HP with vertical industry tools, business process
expertise, and executive relationships.
I'm generally an optimist, but I do have one additional, more gloomy
prediction. Given the alarming state of disarray, look for some type
of security breach in 2009 that exceeds the TJX incident.
On that cheerful note, happy holidays.
More information about the Infowarrior
mailing list