October 19, 2018 By Calvin Bench 3 min read

Two years ago, most people had never heard of ransomware. In 2017, it came out of nowhere to become the fastest-growing form of malware, costing enterprises $8 billion in the process, per IBM’s “2018 X-Force Threat Intelligence Index.”

Then, this year, everything changed. Cryptomining malware became a top data security threat, according to Comodo, while ransomware occurrences declined significantly. What’s more, cryptomining malware is evolving at an unprecedented rate, with more than 100,000 variants already detected. And while ransomware occurrences declined, researchers have still identified 70,000 new variants in the field this year.

The threat landscape is changing faster than ever, and that means our approach to prevention and containment needs to change as well. Cybercriminals use the dark web to exchange sophisticated toolkits for building malware and techniques for penetrating corporate firewalls. It’s impossible to predict the form or timing of the new threats they create, so security teams are forced into a perpetual game of catch-up.

Traditional linear approaches to security software development simply don’t work anymore. By the time a new point release is budgeted, scheduled, developed, tested and released, the criminals are miles away.

How the App Store Model Enables Accelerated Innovation

The key to reversing the tide may lie in the app store concept that Apple introduced a decade ago. The company understood that it couldn’t possibly anticipate all the ways in which people would use iPhones, so it empowered third parties to integrate with its platform. Developers could identify gaps or opportunities that their products could fill and add value to the platform by integrating via published application program interfaces (APIs). In return, Apple would make it easy for developers to reach the massive pool of iPhone users. Everyone benefited: Users got a wide range of value-added options at low cost, developers gained access to a vast audience of potential customers, and Apple’s platform became more valuable with each new app.

Since then, the app store model has been adapted to many other environments. Now it’s touching data security as well, giving customers rapid access to new innovations developed by the community.

For example, users of IBM Security Guardium are especially concerned about ransomware because it destroys data and access. The Guardium development team could have built its own ransomware detection and defense capabilities into the platform, but the process would have taken months.

As it turned out, a team at the IBM Cybersecurity Center of Excellence in Israel had already done much of the work. By taking advantage of the APIs built into Guardium, the developers were able to quickly adapt their solution as an application plug-in that detects ransomware files on monitored database servers. Now, instead of waiting for a new version release of Guardium, customers can immediately get state-of-the-art ransomware protection via the IBM X-Force Security App Exchange.

Why the Wisdom of the Crowd Is Crucial to Data Security

The app store model requires a different approach to software development. Closed and self-contained applications can’t evolve quickly enough, and no single team can keep up with the changing threat environment. A new approach based on RESTful APIs is opening the doors to the wisdom of the crowd.

RESTful APIs provide a highly efficient, flexible and secure way to make a limited range of applications’ services accessible to external functions. For example, developers can do such things as access reports to modify field options, integrate visualization engines with log analyzers and add new data sources.

This more open approach to software development is fueling the growth of what some people call the API economy. ProgrammableWeb’s directory of public APIs has mushroomed from about 2,000 examples in 2010 to more than 20,000 today. Applications that leverage services and integrate smoothly with each other benefit all members of the ecosystem by making innovations immediately available and expanding the value of the underlying platforms.

The wisdom of the crowd has been shown to be the most effective way to solve a wide range of problems because the intelligence of the collective exceeds that of any individual member. Security leaders will need to harness that wisdom if they hope to protect their organizations from the ever-broadening scope of challenges they face today.

More from Data Protection

Defense in depth: Layering your security coverage

2 min read - The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal might steal are stored with even more security — in a locked filing cabinet or a safe. This provides layers of protection for the things you really don’t want a thief to get their hands on. You tailor each item’s protection accordingly, depending on…

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Cost of a data breach: The evolving role of law enforcement

4 min read - If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and most people were still coming to understand the value of data both corporate-wide and personally, there was little incentive to report cyber crime. It was…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today