Virtualization Technology News and Information
Article
RSS
StackHawk 2024 Predictions: Faster Software Development, Better Team Collaboration and AI

vmblog-predictions-2024 

Industry executives and experts share their predictions for 2024.  Read them in this 16th annual VMblog.com series exclusive.

Faster Software Development, Better Team Collaboration and AI

By Dan Hopkins, VP of Engineering at StackHawk

In 2023, from the cybersecurity vendor perspective, strong M&A activity and company consolidation continued, despite uncertain economic headwinds. Many of the larger security companies continued to acquire smaller vendors to help plug gaps in their technology offering and/or to expand it. While M&A activity has slowed due to increases in scrutiny by regulatory bodies, this year, we witnessed many private acquisitions in the security market to bring companies together.

There was one market in particular, the Application Security Posture Management (ASPM) industry segment, which carried strong momentum this year. Large industry players, including Snyk, acquired companies with robust ASPM capabilities to integrate into their solution suite and product portfolio. These moves demonstrate the growing importance of application security as application and software development life cycles continue to shorten. 

This year, almost every organization was also forced to do more with less when it came to security. With many implementing hiring freezes in response to difficult economic circumstances, organizations started to focus their efforts on addressing their most critical vulnerabilities and threats first. CISOs and security teams reevaluated their set of solutions throughout the course of the last year and many began removing legacy tools and solutions which no longer served a strong purpose in a bid to cut costs.

Looking forward to 2024, there is no doubt that cybersecurity, specifically application security, will remain a critical C-level priority. Let's explore some of the top trends that organizations can expect to see emerge and continue in the new year. 

Legacy solutions will become obsolete

Faced with difficult economic headwinds, organizations and their security teams will continue to reevaluate their set of security solutions and remove legacy tools from their tech stack to reduce spend. More expensive, low performing tools that have been limping along over the past decade will continue getting kicked out of organizations' security solution roster in 2024. This particularly relates to many of the legacy tools built in the early 2000s and during Web 1.0. If you are buying security tooling in 2024, make sure it supports your understanding of how your systems work and helps you discover everything which exists within your environment.

Faster development life cycles will continue

In 2024, the march towards faster development lifecycles to keep pace with demand will continue. As developers and organizations push new applications into production faster, organizations must ensure that security practices happen in real time in the CI/CD pipeline as software engineers are developing source code. In the new year, organizations must also devise and implement strategies that facilitate connection between runtime and testing. Currently, the way that we protect our systems is very disconnected from the way that we test and prevent vulnerabilities from getting out the door. There needs to be more cross talk between the two.

Engineering and security teams must be more collaborative

A trend expected to continue in 2024 is more need and willingness for collaboration between security and engineering teams. Time and time again, many security risks and vulnerabilities can be traced back to security teams being unaware of what engineering teams are doing and which applications are being created and deployed. Most organizations still haven't built a cultural connection between these two important teams. Over the next 12 months, it is pivotal that organizations place more onus on forming collaborative relationships with software engineering and security teams. The two teams must not be viewed as separate but rather one group working cohesively. Better partnerships will ensure security teams are aware what applications and code exists within their environment and will also lead to security practices being better understood by those creating the software. To facilitate this bond, organizations must ensure that any security solutions purchased helps the software engineering and the security teams work in parallel.

As engineers are accustomed to working with solutions that have easy to use, efficient and well-appointed user interfaces (UIs), as they become more involved in the security process, they require the same level of efficiency within security tooling.

Basic application security hygiene remains key

As we witnessed in 2023, the areas where organizations and their applications continue to be exploited remain largely the same. It is very telling that the OWASP Top 10, which outlines the most imminent risks pertaining to application security, has not changed significantly over the past several years. Basic vulnerabilities, particularly those found within APIs, widely persist and are causing astronomical risk. Organizations need to raise the minimum bar that they are working at when it comes to their AppSec posture. That starts with developing a more comprehensive understanding of their infrastructure and what exists within it. Organizations need to get started with basic discovery to understand their attack surface. Once that is achieved, they can then begin to bring in the basic security practices to fill any identified gaps.

Big opportunities with AI and LLM but approach with caution

Artificial intelligence (AI) and large language models (LLM) dominated the industry conversation in 2023. And rightfully so. Many remain excited about the significant enhancements to productivity they may bring, a huge win for organizations struggling with limited resources during these tumultuous economic times. But it's important that we approach these new technologies with caution. While they have the potential to augment business operations, attackers will also be leveraging these tools to execute attacks on organizations and their employees. It is possible that we'll see a rise in attacks on humans in the new year, particular phishing scams.

##

ABOUT THE AUTHOR

Dan Hopkins 

Dan Hopkins is VP of Engineering at StackHawk. He has been a software engineer for 20 years, working at high growth startups such as VictorOps and LivingSocial and at large high-tech companies such as Splunk. For the last 10 years, he has focused on building tools for progressive engineering teams adopting DevOps and DevSecOps practices.

Published Friday, November 17, 2023 6:00 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<November 2023>
SuMoTuWeThFrSa
2930311234
567891011
12131415161718
19202122232425
262728293012
3456789