Jack Wallen runs through 10 of the most important cybersecurity threats, breaches, tools, and news of the year.
2019 is almost over. On many levels, it has been a memorable year; technology continued to show its prowess and agility, especially given the number of security threats. These security threats came in many forms, from the standard to the “I never thought that could happen,” but no matter how the data breaches occurred, we are still far removed from living a life where technology is secure. Let’s look at the year of insecurity that was 2019.
SEE: The 10 most important cyberattacks of the decade (free PDF) (TechRepublic)
Containers have become the darling of the enterprise–they make it possible for businesses to deploy microservices and applications at an unheard of rate and scale–but with that popularity comes the threat of attack. One of the most obvious points of entry is the container image. There was a significant rise in security issues within container images in 2019.
Kubernetes will remain at the top of the enterprise heap and will be the target of more attacks. Security tools will be at a premium in 2020–you can count on that.
According to IDC, global Android market share rose to 87% in 2019. With over 2.5 billion active Android devices, logic dictates that it is the biggest target for attacks, and logic is correct. Attacks like xHelper and Joker, as well as the adware attacks found in Google Play Store apps, prove that Android has a way to go before it can claim to be a fully secure platform.
SEE: How to prevent the top 11 threats in cloud computing (free PDF) (TechRepublic)
If it had not been for Capital One, the Evite breach would have been the largest in history. One hundred million records were breached from an inactive data storage file. The information was from 2013 and earlier, and it included names, usernames, email addresses, passwords, birthdates, phone numbers, and mailing addresses. Fortunately, Social Security numbers, bank account information, and credit card numbers were not part of the information stolen because the company doesn’t store that information.
SEE: These are the worst hacks, cyberattacks, and data breaches of 2019 (ZDNet)