Breaking News

How Security Views and Approaches Have Shifted in 2018

2018 has been a record year for security breaches – but that’s not news.  Inevitably, each year has more security incidents than the previous year, and the pa

ttern is likely to continue for the foreseeable future. So, what’s the good news?  The security industry is more connected and better at networking than ever, and best practices are freely available.  Even better, the security industry is evolving as a community, and we are learning stronger methods of protection and useful techniques are constantly being updated to protect businesses.

Before the clock turns to 2019, let’s look at some favorite trends in modern security from 2018:

Reframing security as ‘risk management,’ rather than as a ‘bulletproof wall’

 Security is finally giving serious consideration to the ‘real world.’   There’s no bigger indicator of this shift than the common vulnerability scoring system (CVSS), which provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity. The standard is currently at version 3.0 and allows enterprises to adjust scores according to the importance of the system under consideration. For example, a vulnerability in a development server is less serious than the same vulnerability in a production server, and now, businesses can quantify this!

No organization is impenetrable.  Modern cybersecurity takes the viewpoint of minimizing risk, while making evaluated and quantified trade-offs.

Security teams working alongside engineering teams, instead of as a gatekeeper

Increasingly, firms are changing how security teams operate in conjunction with engineering or development teams.  This means that instead of acting as a checkpoint that development needs to pass through in order to get new code deployed, the security team works alongside the dev team, providing access to the tools and training they need to get the job done securely and effectively.

This repositioning of security from the former gateway to that of a teammate encourages collaboration and also allows the developers to foster an interest in security on their own – which is an important goal in the first place!

An incremental approach to security

Instead of presenting security as an all-or-nothing ultimatum, the most effective security teams are working to evaluate and help each team in the organization  .  Demanding that a team in the organization uses PGP encryption for sensitive emails is not going to have any real effect if the sensitive documents are also shared in cloud storage, for example.

The bottom line is that security can only be effective when it is approached on an individualized basis.  Each team has different needs and skillsets, and so, the security plans for each should be constructed with those differences in mind.  Therefore, the protection is right for the type of information that team must safeguard.