Two years ago, most people had never heard of ransomware. In 2017, it came out of nowhere to become the fastest-growing form of malware, costing enterprises $8 billion in the process, per IBM’s “2018 X-Force Threat Intelligence Index.”

Then, this year, everything changed. Cryptomining malware became a top data security threat, according to Comodo, while ransomware occurrences declined significantly. What’s more, cryptomining malware is evolving at an unprecedented rate, with more than 100,000 variants already detected. And while ransomware occurrences declined, researchers have still identified 70,000 new variants in the field this year.

The threat landscape is changing faster than ever, and that means our approach to prevention and containment needs to change as well. Cybercriminals use the dark web to exchange sophisticated toolkits for building malware and techniques for penetrating corporate firewalls. It’s impossible to predict the form or timing of the new threats they create, so security teams are forced into a perpetual game of catch-up.

Traditional linear approaches to security software development simply don’t work anymore. By the time a new point release is budgeted, scheduled, developed, tested and released, the criminals are miles away.

How the App Store Model Enables Accelerated Innovation

The key to reversing the tide may lie in the app store concept that Apple introduced a decade ago. The company understood that it couldn’t possibly anticipate all the ways in which people would use iPhones, so it empowered third parties to integrate with its platform. Developers could identify gaps or opportunities that their products could fill and add value to the platform by integrating via published application program interfaces (APIs). In return, Apple would make it easy for developers to reach the massive pool of iPhone users. Everyone benefited: Users got a wide range of value-added options at low cost, developers gained access to a vast audience of potential customers, and Apple’s platform became more valuable with each new app.

Since then, the app store model has been adapted to many other environments. Now it’s touching data security as well, giving customers rapid access to new innovations developed by the community.

For example, users of IBM Security Guardium are especially concerned about ransomware because it destroys data and access. The Guardium development team could have built its own ransomware detection and defense capabilities into the platform, but the process would have taken months.

As it turned out, a team at the IBM Cybersecurity Center of Excellence in Israel had already done much of the work. By taking advantage of the APIs built into Guardium, the developers were able to quickly adapt their solution as an application plug-in that detects ransomware files on monitored database servers. Now, instead of waiting for a new version release of Guardium, customers can immediately get state-of-the-art ransomware protection via the IBM X-Force Security App Exchange.

Why the Wisdom of the Crowd Is Crucial to Data Security

The app store model requires a different approach to software development. Closed and self-contained applications can’t evolve quickly enough, and no single team can keep up with the changing threat environment. A new approach based on RESTful APIs is opening the doors to the wisdom of the crowd.

RESTful APIs provide a highly efficient, flexible and secure way to make a limited range of applications’ services accessible to external functions. For example, developers can do such things as access reports to modify field options, integrate visualization engines with log analyzers and add new data sources.

This more open approach to software development is fueling the growth of what some people call the API economy. ProgrammableWeb’s directory of public APIs has mushroomed from about 2,000 examples in 2010 to more than 20,000 today. Applications that leverage services and integrate smoothly with each other benefit all members of the ecosystem by making innovations immediately available and expanding the value of the underlying platforms.

The wisdom of the crowd has been shown to be the most effective way to solve a wide range of problems because the intelligence of the collective exceeds that of any individual member. Security leaders will need to harness that wisdom if they hope to protect their organizations from the ever-broadening scope of challenges they face today.

More from Data Protection

Heads Up CEO! Cyber Risk Influences Company Credit Ratings

4 min read - More than ever, cybersecurity strategy is a core part of business strategy. For example, a company’s cyber risk can directly impact its credit rating. Credit rating agencies continuously strive to gain a better understanding of the risks that companies face. Today, those agencies increasingly incorporate cybersecurity into their credit assessments. This allows agencies to evaluate a company’s capacity to repay borrowed funds by factoring in the risk of cyberattacks. Getting Hacked Impacts Credit Scoring As per the Wall Street Journal…

4 min read

IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

3 min read - KuppingerCole named IBM Security Guardium as an overall leader in their Leadership Compass on Data Security Platforms. IBM was ranked as a leader in all three major categories: Product, Innovation, and Market. With this in mind, let’s examine how KuppingerCole measures today’s solutions and why it’s important for you to have a data security platform that you trust. The Transformation of the Data Security Industry As digital transformation continues to expand, the impact it has had on enterprises is very apparent when…

3 min read

SaaS vs. On-Prem Data Security: Which is Right for You?

2 min read - As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations and standards. However, not all data security solutions are created equal. Are you choosing the right solution for your organization? That answer depends on various factors, such as your industry, size and specific security needs. SaaS vs. On-Premises…

2 min read

Understanding the Backdoor Debate in Cybersecurity

3 min read - The debate over whether backdoor encryption should be implemented to aid law enforcement has been contentious for years. On one side of the fence, the proponents of backdoors argue that they could provide valuable intelligence and help law enforcement investigate criminals or prevent terrorist attacks. On the other side, opponents contend they would weaken overall security and create opportunities for malicious actors to exploit. So which side of the argument is correct? As with most debates, the answer isn't so…

3 min read