Predictions of software cyberattacks for 2022

Nigel Thorpe has a background in software development and moved to the IT security industry with Entrust Technologies at the start of PKI. His knowledge has benefited a number of security companies in the UK, Canada and the US, and he now serves as CTO at SecureAge Technology. With extensive experience in different business environments, Nigel is well equipped to support SecureAge’s mission of cybersecurity made easy. His mission, which he eagerly accepted, is to introduce our revolutionary technology to organizations around the world so that they can experience the benefits of a data-centric approach to information security. Nigel helps organizations protect what matters most – data. Thorpe shares his 2022 predictions of software development cyberattacks, and why online software development repositories will be a target.

It’s going to be so calm for software development cyberattacks in 2022.

Silent threats will be a hallmark of cyber attacks in 2022, according to Nigel Thorpe, CTO at SecureAge. “Rather than launching a massive one-shot attack, cybercriminals increasingly seek to infiltrate an organization unnoticed for long periods of time,” Thorpe explains. “This way, data can be exfiltrated from servers and endpoints at a slow, steady pace so as not to attract attention. And with the increase in home or hybrid work, it’s the information on remote computers that is typically less well protected that is most at risk. By the time these silent attacks are detected, it is often too late.

Nigel Thorpe’s Predictions of Software Cyber ​​Attacks

SecureAge’s Thorpe also believes online software development repositories will be the target of these covert attacks, while software vendors will increasingly be targeted by sophisticated ransomware attacks. These covert attacks allow the cybercriminal to modify the code during the development process, thus providing opportunities for widespread and long-term attacks. These targets are attractive because they offer the highest potential returns, with attacks potentially affecting a large number of end customers.

“It just shows that all data is sensitive and needs to be protected at all times,” Thorpe says. “The traditional method is to try to prevent cybercriminals from gaining access to data with increasing layers of defense and access controls. It’s time to change those habits and start protecting the data itself, whether it’s at rest, in transit, or in use.

Technologies like full disk encryption are great if a software developer loses their laptop, for example, but are unnecessary for protecting data on a running development system. But with technological advancements and fast processing speeds, transparent data encryption can now be used to protect all data, structured and unstructured. This way, the stolen information remains protected and unnecessary for cyber criminals.

“We need to start beating ransomware criminals at their own games. After all, they can’t demand a ransom for data that’s already encrypted before accessing it,” Thorpe says.

Become a subscriber to App Developer Magazine for just $ 5.99 per month and enjoy all of these benefits.

Margie D. Carlisle