Are Companies Overlooking Security on the Path to Digital Transformation?
November 25, 2019

Michael O'Malley
Radware

The shift to DevOps production models, and the increasing reliance on serverless or containerized architectures is often driven by the need for operational speed and consistency. Digital transformation is supposed to make work smoother and more productive.

New research from Radware demonstrates the effect that the shift to microservices and the ever-evolving imperatives of digital transformation have had on organizations’ security posture.

A survey of 278 IT experts and executives from major companies (all of them had more than $250 million in revenue) found that security professionals aren’t always in the driver’s seat when it came to their company’s security posture. In fact, a full 70 percent of CISOs were not the top influencer when it came to deciding software policy, tools, or implementation.

That finding comes amid a massive shift in the operational structure and architecture of many IT teams that has engineers using new tools and finding new ways of working. These new methods have some wondering if security is an afterthought.

The Numbers Behind Digital Transformation

The survey illustrates the speed of two developments on the path to digital transformation. The first is the shift to DevOps or DevSecOps production models. The second is the increasing adoption of serverless or containerized architectures.

On the production model front, the data shows that more than 90% of respondents have DevOps or DevSecOps teams. It’s still a relatively recent phenomenon. Just one out of every five DevOps or DevSecOps teams have been in place for more than two years.

On the microservices side, the pace of change is even more in flux. Just ten percent of companies had no plans to migrate applications to serverless or containerized architectures. Most respondents saying they were either testing the water or were already moving along this particular path. Only about one in five respondents said they had migrated more than 50 percent of their apps to microservices architectures.

And these shifts are leading, as is the case, to some so-far unforeseen consequences. More than nine out of 10 reported data breaches in the prior year. More than half, 53 percent believe that some of these breaches were the result of poor communication or misunderstandings with their cloud provider over who was responsible for what.

Why Companies Are Still Vulnerable

One might suspect that companies in a state of flux are giving security considerations the short straw. And yet, that isn’t what the responses indicate. Companies are continuing to implement their current security architectures, however they are not evolving those same architectures for the new world.

More than half of the companies had multiple security protocol tools in place, with 70 percent having security controls on east-west traffic, 75 percent using a web application firewall, and more than half performing code reviews.

Companies are investing in tools, and using best practices, but they are still falling victim to successful cyberattacks. The shift in operations and architecture has exacerbated security dangers.

So, what can companies do about it?

The key lies in that first statistic in this article. CISOs have relevant security expertise. They need a seat at the table.

For one thing, companies need to defy — just a little — one of the imperatives driving the switch to containerless architecture: they need to slow down. The importance of planning can’t be ignored, and planning takes time. But it ensures that relevant stakeholders, like CISOs, play a strong role in decision-making.

The role of training can’t be ignored either. Terms like DevOps and digital transformation sound like technology-driven terms. In reality, they describe the way people are oriented toward and organized around their work. To get the most out of operational and architectural changes, invest in people.

It might seem unsatisfying to some to suggest that the solution to security woes doesn’t live in the technology stack. After all, the whole point of technology is the scalability of work. People are anything but scalable. But training, expertise, judgement, and consensus-building are critical components of security policy that add vital context to any organization.

Michael O'Malley is VP of Strategic Marketing for Radware
Share this

Industry News

April 25, 2024

JFrog announced a new machine learning (ML) lifecycle integration between JFrog Artifactory and MLflow, an open source software platform originally developed by Databricks.

April 25, 2024

Copado announced the general availability of Test Copilot, the AI-powered test creation assistant.

April 25, 2024

SmartBear has added no-code test automation powered by GenAI to its Zephyr Scale, the solution that delivers scalable, performant test management inside Jira.

April 24, 2024

Opsera announced that two new patents have been issued for its Unified DevOps Platform, now totaling nine patents issued for the cloud-native DevOps Platform.

April 23, 2024

mabl announced the addition of mobile application testing to its platform.

April 23, 2024

Spectro Cloud announced the achievement of a new Amazon Web Services (AWS) Competency designation.

April 22, 2024

GitLab announced the general availability of GitLab Duo Chat.

April 18, 2024

SmartBear announced a new version of its API design and documentation tool, SwaggerHub, integrating Stoplight’s API open source tools.

April 18, 2024

Red Hat announced updates to Red Hat Trusted Software Supply Chain.

April 18, 2024

Tricentis announced the latest update to the company’s AI offerings with the launch of Tricentis Copilot, a suite of solutions leveraging generative AI to enhance productivity throughout the entire testing lifecycle.

April 17, 2024

CIQ launched fully supported, upstream stable kernels for Rocky Linux via the CIQ Enterprise Linux Platform, providing enhanced performance, hardware compatibility and security.

April 17, 2024

Redgate launched an enterprise version of its database monitoring tool, providing a range of new features to address the challenges of scale and complexity faced by larger organizations.

April 17, 2024

Snyk announced the expansion of its current partnership with Google Cloud to advance secure code generated by Google Cloud’s generative-AI-powered collaborator service, Gemini Code Assist.

April 16, 2024

Kong announced the commercial availability of Kong Konnect Dedicated Cloud Gateways on Amazon Web Services (AWS).

April 16, 2024

Pegasystems announced the general availability of Pega Infinity ’24.1™.