Raj Samani , Fellow and Chief Scientist of McAfee
Enterprise and FireEye
Game of ransomware thrones . In 2022 , these self-reliant cybercrime groups will shift the balance of power within the RaaS eco-kingdom from those who control the ransomware to those who control the victim ’ s networks .
Ransomware has generated billions of dollars in recent years and it ’ s only a matter of time before some individuals who believe they aren ’ t getting their fair share become unhappy .
Keep a close eye on API . Recent statistics suggest that more than 80 % of all Internet traffic belongs
to API-based services . 5G and IoT traffic between API services and apps will make them increasingly lucrative targets , causing unwanted exposure of information . The connected nature of APIs potentially also introduces additional risks to businesses as they become an entry vector for wider supply chain attacks . In most cases , attacks targeting APIs go undetected as they are generally considered as trusted paths and lack the same level of governance and security controls .
Hijackers will target your application containers . Containers have become the de facto platform of modern cloud applications . In a recent IBM survey , 64 % of adopters expected to containerize over 50 % of existing and new business applications over the next two years .
However , the accelerated use of containers increases the attack surface for an organization . And while attacks against containers are not new , in 2022 , we anticipate expanded exploitation on the orchestration layers , increasing use of malicious or backdoored images through insufficient vulnerability checks and increasing attacks targeting vulnerable applications .
Zero cares about Zero-Days . 2021 is already being touted as one of the worst years on record with respect to the volume of zero-day vulnerabilities exploited in the wild . The scope of these exploitations , the diversity of targeted applications and ultimately the consequences to organizations were all notable .
2021 is already being touted as one of the worst years on record with respect to the volume of zero-day vulnerabilities exploited in the wild .
As we look to 2022 , we expect these factors to drive an increase in the speed at which organizations respond . As a consequence , we can also expect renewed diligence around asset and patch management . From identifying public facing assets to quickly deploying patches despite potential business disruption , companies will have a renewed focus on reducing their ‘ time to patch ’. p
84 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com