Cybersecurity

We are in the “shift left” and open source era.

The Internet, and machine to machine communication, was designed for connectivity and sharing. Our personal information, financial information, industry and government trade secrets, are hosted on platforms that are susceptible to those with nefarious interests. The world is going to become more connected, not less connected.  With the Internet of things there will be billions more connected devices.

As developing countries grow and join global commerce and communication, billions more people are coming online.  Further complicating the issues surrounding cyberspace is that the cybercriminal continually becomes more sophisticated and gains more tools which in turn forces defense systems to be increasingly dynamic and continually inventive. Solutions are beginning to change from statistical and heuristic to deterministic. Deterministic solutions are beginning to span firewall technology, malware analysis, lateral movement and exfiltration mitigation.

The corporate perimeter is now global, and the solutions sold to large corporates may soon reach all the way down to the individual consumer paying for personal cybersecurity.  Cybersecurity answers the questions of how we will continue to grow safely and responsibly in this interconnected world.

Within application development we are in the “shift left” and open-source era. Today the developer is not only responsible for good code,  but also securing the code. Vulnerabilities in popular open source libraries (e.g. Log4j) have demonstrated the need for OS security solutions and better software development lifecycle practices. More generally, we will see consolidation in endpoint security, cloud security, data privacy, identity and access management, and network security.