10 security predictions for 2018

Cyber security isn’t getting any easier. Criminals are getting more sophisticated. Damages are growing more serious. And attacks are becoming more common.

Yet far too many IT and cyber security leaders remain in reactive mode. That’s a serious mistake, because now is the time to be proactive. These incidents will happen, so every organization now needs to plan and practice for attacks and threats.

The mix is changing, too. Last year we predicted that the top cyber issues would include scale, safety, disclosure, extortion and talent. While those remain important, for this year we’ve identified 10 new cyber security threats. They include hotter cyberwarfare, increasingly sophisticated ransomware, frustrating patches and the fallout from “serverless” computing.

Here’s a quick look at the top 10 security predictions for 2018 discussed in a recent white paper developed by DXC Technology’s team of security advisors, technologists and architects.

  1. Cyberwarfare heats up: Already a serious threat, cyberwarfare will escalate. Geopolitical tension among countries with offensive cyber capabilities will continue to grow, and rogue nation states will continue to target critical national infrastructures and operational technologies.
  2. More ransomware: The agility of already-formidable ransomware attacks will increase with advanced technologies such as AI, cloud, virtual networks, Agile code development and automation. Attackers who succeed once will attack again, hoping to maximize their returns with larger ransom demands. With practice, these attacks will grow increasingly sophisticated.
  3. Patching expectation feeds frustration: Many organizations need to modernize their patch-deployment cycles as the pace of attacks quickens. Three years ago, the time between a vulnerability being identified and an exploit becoming operational “in the wild” could be five weeks or more; now it’s just seven days.
  4. Serverless computing skews security: Users of serverless computing no longer manage a virtual machine (VM) or its operating system — radically changing security requirements. Enterprises should focus on application security, promote DevSecOps development practices and invest in training and data handling.
  5. Vulnerability at the IoT edge: By supporting high-value business activities, edge computing continues to spur the growth of the Internet of Things. But edge computing can also drive increased attacks. That’s because it’s often procured and run outside the standard corporate processes and governance, allowing security policies to be sidestepped.
  6. The CISO deploys clones: Chief information security officers are repositioning discrete security groups and embedding security throughout the operation. Each department has a person responsible for security — often reporting to a central authority.
  7. Credential theft gets automated: The credential process, fundamental to the Microsoft Windows operating environment, continues to be a favored entry point for cybercriminals. Hackers are already using automated credential theft to infect authentication mechanisms.
  8. The SOC is dead — long live the SOC! The Security Operations Center will evolve. Overwhelmed by existing traffic volumes and held back by a shortage of skilled workers, the average SOC is approaching a state of crisis.
  9. Cyberattacks go deeper: Attacks will be not only more numerous, but also more sophisticated. Criminals will move deeper into the software stack, even into firmware and hardware, to gain new levels of access while remaining undetected. As the recent Meltdown and Spectre security threats illustrate, the need for trustworthy cyber-resilient systems has never been greater.
  10. Cryptocurrencies come under attack: Cryptocurrencies such as Bitcoin, as well as the underlying blockchain technology, will be extremely attractive to cybercriminals. Cryptocurrency theft can be extremely lucrative — and extremely difficult to trace.

The digital transformation of business is putting information technology at the center of the enterprise, which means organizations need cyber resiliency — the ability to keep transforming efficiently and effectively in the face of increased threats from nation states, criminals, competitors, insiders and more. That’s how we’ll defend against these threats in 2018.

Read the full DXC paper, “10 Security Predictions for 2018: Thrive Safely on your Digital Transformation Journey.”

Chris Moyer is Vice President and General Manager of Security for DXC. He has spent more than 25 years building business and technology solutions for clients in several industries across multiple geographies. In previous roles, he has led solutioning, transformation projects and delivery assurance. He is also a member of the Institute of Electrical and Electronics Engineers. Connect with him on Twitter and LinkedIn.


  1. Chris, it surely is a timely issue you have brought up with details that cover all the essential aspects. It is a matter of huge concern that the governments of the world have still remained imperceptive to the issue involving our future. We have not till now seen any tangible steps in the horizon. Wondering when they will rise and combat the impending threats.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: