SecDevOps becomes a reality for 87.3% of companies
According to widespread industry reports, just under seven-eighths of companies will adopt a SecDevOps methodology (which proves to be an improvement over DevSecOps). For the first six months of 2019, development teams will build and deploy new applications at unheard of speeds. By midyear, continuous integration of SecDevOps serverless microservices mesh-based container architectures will start to continuously deliver infrastructure engineers crying themselves to sleep.
Edgewise’s own infrastructure engineer Sean Lutner says he has already stocked up on Kleenex Ultra Soft™ in anticipation of this shift. Lutner further predicts that the rate of unpatched zero day vulnerabilities will skyrocket.
Edgewise announces Vapor Computing
In response to Cisco’s fog computing initiative, Edgewise will abandon its fundamental cloud workload protection product to focus on “Vapor Computing.” In this initiative, data and computation are not merely moved closer to the end uer, but exist inside the end user enterprise.
As a result, the Vapor Rising Consortium, founded in November 2018 and comprised of leaders from major tech companies, will aim to standardize and promote Vapor Computer. The goal of the Consortium will continue to be to make Vapor Computing as widely adopted as STIX and TAXII have been for the past 5 years.
As a negative consequence, Vapor Computing will be confused with vaping, causing millenials to rush to dispensaries only to ask for a product which does not yet exist (stay tuned for our 2020 predictions).
Cybersecurity pros will say “next” on next-generation firewalls
Edgewise predicts that customer satisfaction with firewall vendors will be only slightly lower than the major cable providers' customer approval ratings. Due to the inadequacy of address-based controls in dynamic environments, and the ease with which cyber criminals can poke through next-gen firewalls to hijack blindly-trusted communications on the network and move laterally to exploit databases containing customer information, intellectual property, and financial data, security pros will decry, “No more!”
In an attempt to slow customer churn, NGFW sales reps will offer free logging services. When admins become inundated with alerts, they will miss critical information leading to indicators of compromise, find that they’ve had attackers sitting in their network for over 4 years, and fire all the firewall vendors. In turn, admins will be forced to find and implement new solutions that actually stop attackers from exploiting communication paths and accessing critical data.