2022 Cyber Predictions: Everything is Code

This post is part of our ongoing predictions series.

Moshe Zioni, vice president of security research at Apiiro and former director of threat research at Akamai shared his 2022 cybersecurity predictions.


Everything Is Code


"I believe that there will be a new trend where even hardware goes towards a everything-is-code transition. For years virtualization technologies have been progressing towards this notion but now, in light of the global chip manufacturers shortage, giants like Intel and Nvidia have started to introduce code-solutions to harness a hardware-like experience. In turn, it will require ops and IT teams to adhere to it in order to grow rapidly, automate and evolve.”


Supply Chain Attacks Sightings Will Peak


“I believe that supply chains will peak in 2022 due to insights from both sides of the coin. For example, on the attacker’s side, cybercriminals will be drawn to supply chain attacks more than ever because of the ease of operation under the ‘black-box’ that those systems provide. With that said, from the defender's side, I foresee that we’ll see more and more solutions, detection mechanisms and practices for different parts of the supply chain that will be present at more enterprises, leading to better detection chances.”


Low-code/No-code Solutions and Systems Will Be Targeted, Attacks Will Go Dormant for Awhile


“The dire need of professionals for many code-related positions - that are mostly not developers - is becoming a big issue for companies. In turn, this will spur a plethora of no-code/low-code automations that corporations will be willing to consume. We’ve learned from the past that once the need for speed is present, security practices are more susceptible to be overlooked, which by that - attackers will not be late to take advantage of this fact.”


Remote & Hybrid Work Will Further Disrupt the Modern Threat Models, Especially Within Low-tech Industries


“Remote work has been a challenge for many businesses. While some industries and enterprises have been fast to respond in order to retain business continuity, this actually exposed them to a more complex threat model. More specifically, this transition set a slew of new standards and highlighted more robust attack vectors that these organizations aren’t normally used to.”


Less Reliance on On-prem, Increased Demand and Adjusting to Cloud-native and SaaS Solutions


“As part of new cybersecurity adjustments, the need for “shift-left” will increase dramatically as more companies move to cloud-based infrastructure and solutions.”


###