You can fix the problem now for $1,000, or you can fix it down the road for $20,000.
By Christine Kent, Workflow contributor
When the zero-day vulnerability Log4Shell put millions of applications, databases, and devices at risk, hundreds of companies scrambled to mitigate the threat. The situation was critical: Researchers logged more than 800,000 related attacks within 72 hours of disclosure. The National Vulnerability Database, a U.S. government project that catalogs and assesses exploitable cyber risks, rated it 10 out of 10 on its scale of serious threats. Wired called it a “full-blown security meltdown,” adding, “the Internet is on fire.”
Naturally, cybersecurity teams were on the front lines of the fight. But many companies that fared the best took an additional step. They brought product developers to the table, too.
JupiterOne, a cybersecurity firm, was among them. Working hand in hand, security experts and product engineers evaluated the company’s security posture and let all teams know where any vulnerabilities lay and how to tackle them. While the security specialists took the lead in identifying risks, the developers guided them through the ins and outs of products they knew intimately because they had created them. JupiterOne easily fended off any potential attacks.
The need to stay one step ahead of cybersecurity risks like Log4Shell has been driving a growing number of companies to get serious about this kind of collaboration. Known as DevSecOps because it brings together the product development, cybersecurity, and operations teams, the approach is still taking shape. For some companies, it can mean introducing testing processes earlier in the development cycle; others may choose to fully merge teams. The biggest challenges to successful implementation are often cultural, but the benefits are increasingly hard to ignore.
Related