Skip to content

Inside a hackers’ playbook for 2025: What to watch for

 

Summary: We spoke with Mary D’Angelo about how “moving left of the boom” in the cyber kill chain can help your business stay secure.

Why can unskilled cybercriminals now run sophisticated attacks? Will cybercriminals outpace us in an AI arms race? And what is the next big thing in cybersecurity in 2025?

We asked Mary D’Angelo, a threat intelligence and dark web expert, for her insights on emerging cyber threats and how businesses can prepare to protect themselves.

The interview’s highlights

  • AI and cybersecurity in 2025: 2025 is definitely going to be an AI arms race, with cybercriminals versus us.
  • Key industries under attack: Financial, healthcare, and manufacturing will still be the hardest-hit sectors.
  • The kill chain, cybercriminal tactics: Cybercriminals often follow the cyber kill chain, starting with gathering intel and ending with data exfiltration.
  • Moving “left of boom” with threat intelligence: Threat intelligence lets you disrupt attacks during the reconnaissance phase before they escalate.
  • The importance of proactive defense: No business is too small to be attacked, so businesses should make it more difficult for cybercriminals.

Cyber threats in 2025

Key insight #1: 2025 is going to be an AI arms race, with cybercriminals vs. us

NordLayer: As we closed 2024, what was the most common cyber threat?

Mary D’Angelo: The most common threat has been ransomware and other financially motivated attacks, a trend that is likely to continue in 2025. These attacks will become even more common because of the lower barrier to entry. Now, even relatively unskilled hackers can access different tools, like AI and malware, to run sophisticated attacks.

An example of this is the Lockbit source code leak that happened early in 2024. Many cybercriminals gained access to it, made minor tweaks to the code, and then deployed it onto their victims’ networks.

NordLayer: Gartner predicts that 25% of breaches will involve AI by 2028. What are the emerging threats in 2025 we should brace for, in your opinion?

Mary D’Angelo: I saw that stat, too, and I thought it was a really, really low number. From the research that I’ve done and the attacks that I’ve seen, most already include some level of AI. So by 2028, I think most attacks, not just 25%, will be using AI. 2025 is definitely going to be an AI arms race, with cybercriminals versus us.

Deepfakes will definitely be a huge one. Fake videos will be mostly used for social engineering tactics, and even phishing attempts will be automated by AI. For example, the content of phishing emails will seem much more authentic.

Another thing is AI-powered malware. It’s very sophisticated and can evolve based on the environment it’s in, making it harder to detect and neutralize.

There are also AI-poisoning tactics. As the name suggests, these involve manipulating AI models in security systems so that they produce incorrect results in cybersecurity operations. It’s a bit like the cat-and-mouse game, really.

NordLayer: These AI threats mean companies need to be more proactive. With cybercrime expected to cost $13.82 trillion by 2028, which industries will be hit hardest next year?

Mary D’Angelo: I think it’s the same as in 2024, so financial, healthcare, and manufacturing. Financial because it’s the most lucrative. Healthcare is often low-hanging fruit. Threat actors know it is stretched thin without the budget and resources to adopt better tools. However, healthcare has incredibly valuable data, which will always be a target. Manufacturing is at risk, too, mostly due to shadow IT and legacy systems. The infrastructure is often outdated, making it easier for threat actors to exploit.

However, there are attackers with a moral code. Some won’t target hospitals because of the ethics behind it. But they’ll justify attacking banks and large financial organizations. So, the financial sector will always be a top target.

Key insight #2: Bad actors typically use the cyber kill chain approach to carry out attacks

NordLayer: How do cybercriminals typically plan their attacks?

Mary D’Angelo: When you say cybercriminals plan their attacks, I think that gives them too much credit. They’re usually financially motivated, opportunistic, and sporadic. They’ll do research on who they want to target, but it’s not incredibly thorough because they look for the easiest prey and easy money.

NordLayer: And what tactics do cybercriminals use?

For their reconnaissance, they’ll go into the dark web, where many initial access brokers sell credentials at a decent price. But they follow what is called the cyber kill chain. It’s like the steps a threat actor takes to achieve their objective. The kill chain is basically six or seven stages, but it always starts with gathering intel. Then you have weaponization, where you develop the weapon you plan to use. Then, you have your command and control stage. Finally, data exfiltration or the attack.

NordLayer: The cyber kill chain is the hackers’ playbook, right?

Mary D’Angelo: Yes, the MITRE ATT&CK framework does a great job of defining the tactics a threat actor uses when trying to exfiltrate data from a network. Cybercriminals often don’t deviate from their playbook because it works. As the saying goes, if it ain’t broke, don’t fix it. They’ll try new approaches only when access is taken away from them, forcing them to start over.

It’s unfortunate, but organizations often fall behind because they lack the resources to implement better detection and response tools. Smaller organizations, including hospitals, don’t have those resources and hence are more vulnerable.

NordLayer: Given the threats and hacker tactics we’ve just discussed, what are the top 5 challenges businesses face this year?

Mary D’Angelo: Patching, technical debt, and legacy systems will be big challenges. Cloud security is still in its infancy for many organizations, so we’ll need to work on it collectively. Exposed and misconfigured vulnerabilities within systems also need attention.

Threat-specific responses

Key insight #3: “Moving left of boom” lets you stop attacks before they start.

NordLayer: How can threat intelligence solutions and security solutions work together to prevent cyber threats?

Mary D’Angelo: When it comes to threat intelligence, there are three buckets: tactical, operational, and strategic. If these three work alongside security operations, they can help you be more defensive rather than constantly reacting at the last minute. This way, you’re not always on the edge of your seat when threats or attacks come in.

Tactical threat intelligence helps security operations by providing background on indicators of compromise and ongoing threats. Strategic threat intelligence is about planning for the year. Executives will identify the ransomware groups more likely to target their organization and their tactics, then build a defense plan for the year to stay strong against them. Operational intelligence is about the day-to-day, ensuring your business has the right intel to respond effectively.

Most security tools don’t alert you until stages two or three of the kill chain. The advantage of dark web intelligence and threat intelligence is that you can be alerted at the very first stage—during the reconnaissance phase. This is when threat actors are doing their research to identify their next victim and how they plan to attack. By catching the threat early, you disrupt the cybercriminal, forcing them to start over with someone else.

That’s why threat intelligence is a powerful tool for organizations if done correctly and made actionable.

NordLayer: Threat intelligence has the power to break this cyber kill chain. How does it work?

Mary D’Angelo: Organizations often track their key criminal groups through strategic threat intelligence. For example, if I were in healthcare, I’d focus on the threat actors targeting the healthcare industry and understand their tactics and techniques. Once I identify these groups, I can set up systems to detect their activity.

A good analyst tracking the right dark web forums and marketplaces might come across an initial access broker selling credentials for a hospital. These brokers are very sneaky—they don’t directly name the hospital but mention the industry and the company’s revenue size. But if you’re sharp, you can identify the target hospital.

Once you know the attack is targeting you, you’re ahead of the game. The broker sells privileged access to the hospital, which could lead to a breach. By spotting this early, you can take action to mitigate the threat.

We always say “move left of boom,” a military term. It’s about getting as far left on the kill chain as possible. Instead of being alerted at stage three, when you’re panicking, you can act early and prevent the attack before it escalates.

NordLayer: So moving to the left of the kill chain also means always upgrading your security?

Mary D’Angelo: Yes, absolutely. Stressing that no business is too small to be attacked is never enough. So gear up for it and make it more difficult for cybercriminals.

NordLayer: Thank you very much for your insights.

Mary D’Angelo is a Cyber Threat Intelligence Solutions Lead at Filigran, where she focuses on democratizing threat intelligence. She started her career at Darktrace before joining Searchlight in 2021.

Outside of work, Mary is dedicated to supporting child safety initiatives through the Innocent Lives Foundation. She’s passionate about sharing her knowledge and continuing to learn as the cybersecurity field evolves.

How can NordLayer help?

Cybersecurity can feel overwhelming, but it starts with building awareness of safe digital practices. From there, focus on easy-to-deploy tools or partner with an MSP or MSSP to protect against opportunistic attacks.

NordLayer is a toggle-ready platform that offers comprehensive security to protect your business. Our solutions include:

We also recommend multi-layered Zero Trust Network Access (ZTNA) policies for stronger network protection. Need help? Our sales team is always ready to guide you every step of the way.

Monitoring the dark web is crucial for staying ahead of threats. This is where NordStellar comes in. It tackles vulnerabilities during the reconnaissance phase of the cyber kill chain.

The platform automates key security tasks, such as:

  • Dark web monitoring to track company-related risks
  • Leaked data management to protect employees and customers
  • Attack surface assessments to identify and mitigate potential weaknesses.

Together, NordLayer and NordStellar provide a proactive, multi-layered defense to protect your business.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What is identity and access management (IAM)?

So, to be more precise, identity and access management is a cybersecurity framework that allows companies to assign specific access permissions to individual users within the organization to ensure they can access only the systems, networks, and services necessary for their role. This means that, instead of granting all employees equal access to all resources, businesses can control exactly who has access to their systems and data—and for what purpose.

How does IAM work, exactly?

IAM is just a strategy, so it doesn’t work on its own. Therefore, you need the right tools to be able to enforce it and put it into practice in your business. That’s where IAM systems come in.

By definition, the goal of IAM systems is to perform two core tasks: authentication and authorization. Both of these play a part in making sure that the right person will get access to the right resources for the right reasons. Here’s how it typically works:

  • First, the IAM system confirms the identity of a user by checking their credentials against a database that holds everyone’s identity and access permissions.

  • The IAM system grants the user access only to the resources they’ve been assigned.

As you might expect, an IAM system typically comes with a set of dedicated tools that operators can use to easily create, monitor, modify, and delete access privileges for all members of the organization.

The role IAM plays in security

If you’re still asking yourself the question “What is IAM in cybersecurity?”, we are here to tell you that IAM is considered a critical part of cybersecurity these days and that every organization should incorporate it into its cybersecurity strategy. Why? Because IAM security is concerned with reducing identity-related access risks, improving legal compliance, and improving business performance across the entire organization.

What is more, by helping companies manage digital identities and user access to company data, IAM tools make it very hard for non-authorized parties to hack into business networks and cause problems that could lead to big financial losses.

Enterprise identity and access management

As you can probably guess, “enterprise identity and access management” is a phrase that refers to all of the IAM policies, processes, and tools that large-scale businesses can use to manage access to their data and resources more securely and effectively.

Many of today’s enterprise-like organizations have massive IT infrastructures that consist of a vast range of servers, databases, applications, and cloud environments — to which dozens, if not hundreds or thousands, of their employees must have easy access. Enterprise IAM solutions are, therefore, a way for those big enterprises to make their resources available to a large number of employees without making any compromises in regard to cybersecurity.

So, even if your business is a global one — that is, you have thousands of employees and run multiple projects around the world — many of the IAM solutions available today are powerful and flexible enough to give you the ability to manage user permissions and prevent unauthorized access with ease.

What is the difference between identity management and access management?

The difference between identity management and access management essentially boils down to the part each of these two frameworks plays in the process of providing users with access to company resources.

Identity management is about (as its name suggests) user identities and the many ways they can be recognized and verified. Access management, on the other hand, deals with giving or withdrawing permissions and access privileges.

IAM regulatory compliance

Many of today’s lawmakers around the world are striving towards creating and introducing new policies that will help protect the digital lives of their citizens. As a result, many of today’s data privacy regulations (including HIPAA, SOC2, PCI DSS, FERPA, and GLBA) require businesses to follow strict IAM policies, which means they are obligated to manage access to data very carefully.

As you can expect, however, identity and access management solutions can be used to meet some of the compliance requirements (including, of course, IAM compliance)—which is also one of the reasons why enterprises are interested in making them part of their IT environments.

Let us provide you with an example. To comply with the already-mentioned information security standard called PCI DSS, a vendor is required to establish strict IAM policies (including rules that clearly define user identities, authentication, and authorization methods), and processes that restrict access to environments where cardholder data is stored. Only with such IAM policies in place can a vendor become fully compliant with the PCI DSS standard.

Identity and access management benefits

Implementing IAM solutions offers numerous benefits for businesses, regardless of their size or location. These include:

  1. Enhanced cybersecurity – IAM solutions can help all businesses – no matter their size or location – prevent data breaches and protect themselves against malware, identity theft, and phishing attacks.

  2. Simplified work for IT administrators — With the use of IAM tools, IT administrators can develop new, advanced security policies and processes and implement them across the entire organization in a blink of an eye.

  3. Real-time monitoring of company data access — IAM solutions allow you to remain in control of who can access what at your organization.

  4. Ensuring compliance with data privacy regulations — IAM systems are designed to help users comply with legal requirements such as HIPAA, SOC2, and PCI DSS.

  5. Minimizing financial and reputational losses — By allowing you to prevent fraudulent activities and unauthorized use of company resources, IAM solutions can help you maintain business continuity and avoid costly downtime.

Enterprise identity and access management with NordPass

NordPass Enterprise, an encrypted password, and passkey management platform, can be used as an IAM tool to securely provide members of your organization with access to company data, systems, and applications. How so?

First of all, when you use the Business version of the NordPass platform, you can share an unlimited number of digital entry points that you can assign to different departments or teams. This means that you can fully control access to shared credentials, payment information, and other sensitive data across the entire organization. Moreover, thanks to features such as the Activity Log, you can easily monitor all company logins to know exactly who accessed what and when.

Second, NordPass uses multi-factor authentication (MFA), as well as the single sign-on (SSO) authentication method, to identify and verify each and every user once they try to access one of the company accounts. The platform is equipped with three MFA options — an authenticator app, a security key, and backup codes — so that you can provide your team members with a few options in regard to how they can gain access to company resources.

Third, NordPass can help you achieve regulatory compliance. As mentioned, some standards (e.g., HIPAA and NIST) require organizations to implement secure access management solutions. With NordPass, not only can you easily manage access privileges, but you can also establish rules, procedures, and policies that will allow your company to meet certain specifications.

Of course, the fact that NordPass is an encrypted password management solution also means that you and your team members can use it to securely and easily generate, store, manage, and share company credentials. This is something that IAM tools cannot do — just as they cannot run password health check-ups or scan for data breaches to see if any of the credentials, payment information, or emails have been compromised – but NordPass can.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Essential software development security best practices to reduce risks

 

Summary: Focus on security from the start with MFA, safe defaults, and input validation. Prevent SQL injection, XSS, and memory exploits.

Cyber-attacks are growing more frequent and damaging. Critical sectors like healthcare and education are common targets. Threat actors are quick to exploit weak software. This leaves companies and users struggling to keep up. But there’s a better approach: build security into software from the start.

In 2023, CISA launched its Secure by Design campaign. It highlights the need for secure software development and corporate accountability. High-profile breaches like SolarWinds and Kaseya show the risks of weak defenses. They also show why software makers must take the lead on security. 

This article will explore software development security best practices. It’s based on CISA’s guidelines and Secure Software Development Lifecycle ideas. Following these practices reduces risks and builds stronger, safer systems.

Why secure software development matters

Everyone agrees security is critical in software development, yet it’s often unclear how to achieve it. Without secure processes, businesses risk deploying vulnerable applications that bad actors can exploit.

Vulnerabilities by design

Technology powers every aspect of modern life. Internet-facing systems connect critical functions like healthcare and identity management. These innovations improve convenience but also create significant risks. Cyber-attacks have disrupted hospitals, leading to canceled surgeries and delayed care. A single flaw can let attackers exploit systems, threatening lives and data.

Secure software development tackles these risks by focusing on security from the start. Manufacturers who adopt secure design principles take responsibility for reducing risks. Features like default encryption and user authentication ensure fewer vulnerabilities for users.

Historical challenges with patching

Relying on patches after deployment creates extra work for users. For example, if a security flaw is discovered, customers must apply the fix themselves. This process can take time, leaving systems exposed to cyber-attacks. A real-world example is the WannaCry attack, which exploited unpatched systems worldwide.

Secure by Design addresses these challenges by fixing vulnerabilities before product launch. For instance, testing software for common weaknesses, like injection flaws, reduces the need for patches later. This approach aligns with secure software development lifecycle practices, saving time and boosting trust in the software.

Secure by design principles

Secure by Design means building security into every product from the beginning. A good example is adding multi-factor authentication (MFA) as a standard feature. It ensures users have a second layer of protection beyond passwords. Another example is setting safe defaults, like requiring strong passwords or enabling automatic updates.

Manufacturers should also follow software development security best practices, such as performing risk assessments during development. This step identifies potential threats and includes defenses against them. For instance, a defense-in-depth strategy can add multiple layers of protection, like firewalls, secure access controls, and network monitoring tools.

Reducing customer burden

Good software should make security easier for users. For instance, automated updates prevent users from forgetting critical patches. Another example is providing built-in network monitoring tools that alert about potential issues without manual setup. These features contribute to cloud security and cybersecurity resilience.

Manufacturers can also provide clear instructions to users. For example, warning users when they change secure default settings helps maintain safety. By easing the burden on customers, manufacturers ensure better protection and fewer missteps. Conducting security awareness training for users can further enhance security.

Leading by example in secure software

Some companies set the standard for secure development by making it a priority. For example, they use features like Cloud Firewall to support network segmentation. This strengthens security in development environments by blocking unauthorized access. It helps protect users, safeguard intellectual property, and improve access controls.

A strong example is a company implementing Zero Trust Network Access (ZTNA) to limit system access. By requiring users to verify identity and devices, they reduce risks. Such practices, combined with secure coding practices, highlight the value of adopting a secure software development framework.

Common cyber-attacks for software development

 

1. SQL Injection

SQL injection (SQLi) is a dangerous cyber-attack targeting databases. It happens when bad actors add malicious code to input fields. This trick lets them bypass normal security checks and access data. For example, they can use a login form to steal sensitive information. SQL injection remains one of the most common web application vulnerabilities.

The impact of SQL injection is severe. It allows attackers to steal or delete sensitive data. In some cases, they can even take full control of the system. For example, an attacker might enter “OR 1 = 1” into a login field. This tricks the database into granting access without a password. According to reports, SQLi attacks accounted for 23% of major vulnerabilities in 2023.

Organizations handling sensitive data are prime targets. SQL injection attacks can expose personal records, financial data, and trade secrets. For instance, an attacker could use SQLi to steal customer payment information. In extreme cases, attackers have deleted entire databases. Such attacks often result in financial loss, lawsuits, and reputational damage.

SQL injection can also exploit error messages to learn about a system. Some attacks use “stacked queries” to execute multiple commands at once. For example, “DROP TABLE Users;” can delete critical data. In another example, attackers might extract usernames and passwords using the “UNION” SQL operator. This type of attack affects industries like retail, travel, and finance the most.

Preventing SQL injection requires strong secure coding practices. Developers should use prepared statements and validate all user input. Web application firewalls (WAFs) add an extra layer of defense. Regular security audits and vulnerability scans help catch issues early.

2. Command injection

Command injection is a critical software vulnerability. It lets attackers run harmful commands on systems. These commands can grant unauthorized access or full system control.

This issue arises when user input isn’t validated properly. Attackers craft input to manipulate how commands are executed. For example, CVE-2024-20399 involved crafted input to exploit Cisco NX-OS software. This allowed attackers to execute commands with root privileges.

The CVE-2024-20399 flaw affected many Cisco devices, including Nexus and MDS switches. A China-linked group called “Velvet Ant” used it in a cyber-espionage campaign. They targeted network devices to maintain long-term access to organizational systems.

Secure design practices, like input validation, can prevent these issues. Separating commands from input can reduce risks and stop attackers from exploiting systems.

3. Cross-site scripting (XSS)

Cross-site scripting (XSS) is a common vulnerability in web applications. It happens when an application does not validate or sanitize user inputs. This allows bad actors to inject malicious scripts into the application. These scripts can then run on the browser of another user.

Attackers use XSS to manipulate or steal user data. For example, they might inject code into a comment section on a website. When another user views the comment, the script could steal their session cookies. These cookies can give attackers access to the victim’s account. XSS can also redirect users to fake login pages or load harmful files.

XSS is a big problem because it is widespread and preventable. A report from the Open Web Application Security Project (OWASP) lists XSS as one of the most common web application security issues. Proper input validation and using secure coding practices can stop these attacks. Modern web frameworks also help by encoding data to prevent malicious code execution.

Businesses need to take XSS seriously because it can harm many users. One mistake in code can expose millions of people to risk. Regular code reviews, automated tools, and aggressive security testing can help eliminate this threat. Addressing XSS early in the secure software development process is essential to protect applications and their users.

4. Exploitation of known vulnerabilities

Bad actors often exploit known vulnerabilities in software, tracked by unique IDs called CVEs (Common Vulnerabilities and Exposures). These vulnerabilities are listed publicly to help organizations manage and fix security flaws. When actively exploited, attackers use them to spread malware, steal data, or lock systems with ransomware. For example, some types of malware, like worms, spread automatically without user interaction, underscoring the urgency of remediation.

The KEV catalog highlights vulnerabilities actively exploited in real-world attacks. Organizations should prioritize fixing these issues using automated tools to save time and reduce risks. Installing updates, removing outdated software, or applying temporary fixes are key steps to protect systems from exploitation.

5. Memory safety exploits

Memory safety exploits are a common and serious threat. These happen when software written in memory-unsafe languages, like C or C++, mishandles memory. Mistakes in managing memory can cause vulnerabilities like buffer overflows or use-after-free errors. These allow attackers to take control of software, systems, or data. For example, a buffer overflow can let attackers execute malicious code.

Most open-source software (OSS) projects rely on memory-unsafe languages. About 52% of critical OSS projects analyzed include memory-unsafe code. In total, 55% of the lines of code in these projects are written in unsafe languages. Even projects written in memory-safe languages often depend on unsafe components. This increases the risk of memory safety vulnerabilities spreading through dependencies.

The largest OSS projects are more likely to have unsafe code. Among the ten biggest projects analyzed, the median unsafe code usage is 62.5%. In four of these projects, over 94% of the code is unsafe.

These vulnerabilities are especially dangerous in performance-critical software, like operating systems or cryptography tools. Attackers target these systems to exploit weaknesses.

Using memory-safe programming languages, like Rust, can reduce these risks. These languages automatically handle memory management, which helps prevent errors. However, developers sometimes disable safety features to improve performance. This can create new vulnerabilities. Memory safety exploits remain a major challenge and require secure coding practices to minimize risks.

 

Software development security best practices

Implementing software development security best practices is vital for creating secure applications. These strategies help protect users from security risks while improving software reliability. When applied throughout the secure software development lifecycle, they address vulnerabilities and strengthen defenses. Below are key principles and approaches to ensure secure software and reduce evolving threats.

1. Secure by default practices

Ensuring software is secure “out of the box” minimizes user burden and proactively addresses security vulnerabilities. This approach forms a foundation for secure software development.

  • Eliminate default passwords. Replace default credentials with strong, unique passwords during setup. For example, enforce minimum password lengths and block known compromised passwords to protect secure access.
  • Conduct field tests. Evaluate software security features in real-world environments. Insights from red team exercises can identify gaps in firewall settings or weak points in VPN implementations.
  • Discourage unsafe legacy features. Phase out insecure protocols like outdated TLS versions. Use seamless upgrade paths and in-product alerts to encourage the adoption of safer options while maintaining compatibility with cloud security standards.

2. Secure product development practices

Embedding secure coding practices into every stage of the secure software development framework ensures long-term protection against threats and enables secure development.

  • Document secure SDLC framework conformance. Use frameworks like the NIST Secure Software Development Framework (SSDF) to guide development. Publish security requirements and justify alternative approaches for unique use cases in cloud computing environments.
  • Mature vulnerability management. Move beyond patching to address root causes of security vulnerabilities. For example, implement quality improvement strategies to prevent recurring issues in applications involving VPN or network monitoring tools.
  • Foster a workforce that understands security. Conduct security awareness training to educate developers on secure coding practices. Integrate security topics into hiring processes and collaborate with institutions to strengthen cybersecurity skills among future developers.

3. Application hardening techniques

Application hardening strengthens software against exploitation by reducing security risks and making it more resilient.

  • Validate user input. Prevent common attacks like SQL injection and cross-site scripting by sanitizing inputs. For example, in cloud computing environments, validate APIs to protect data integrity.
  • Adopt memory-safe programming. Use languages like Rust to eliminate memory-related security vulnerabilities. This is particularly critical in applications involving sensitive operations like network monitoring or firewall configurations.
  • Implement cryptographic safeguards. Secure sensitive data with encryption and hardware-backed key management. For instance, use hardware modules to store keys securely in VPN or cloud security systems.

4. Reducing attack surfaces

Minimizing unnecessary exposure is a critical component of software development security best practices. Reducing attack surfaces enhances secure software development.

  • Remove unused features. Disable or eliminate features no longer needed, such as legacy APIs. For example, retiring outdated services in cloud computing environments reduces security risks.
  • Create secure configuration templates. Provide templates tailored for low, medium, and high-risk environments. This simplifies secure development while ensuring adherence to security requirements.
  • Implement attention-grabbing alerts. Notify users of unsafe configurations like admin accounts without MFA. For instance, persistent alerts can improve software security by encouraging secure settings in applications.

5. Balancing security and usability

Effective security practices must balance protection with usability. A focus on user experience ensures that secure software development lifecycle measures are effectively implemented.

  • Reduce hardening guide complexity. Simplify guides for end users by automating security configurations. For instance, automated firewall rules and VPN policies can be used to streamline setup.
  • Provide clear nudges. Regular reminders encourage users to address potential security risks, such as enabling MFA or updating to more secure cloud security protocols.
  • Innovate thoughtfully. Design intuitive security features like Single Sign-On (SSO) to reduce friction for users. For example, SSO simplifies access without compromising secure access protocols.

These strategies ensure strong cybersecurity, effective protection in cloud computing, and robust safeguards through tools like VPN, firewall, and network monitoring.

Common mistakes to avoid

Building secure software requires careful planning and attention to detail. Common mistakes are grouped into product properties, security features, and organizational processes.

 

Product properties

Using memory-unsafe languages

Developing software in memory-unsafe languages like C or C++ without a roadmap to reduce vulnerabilities increases security risks. These languages can introduce critical flaws like buffer overflows, leaving systems exposed.

Software manufacturers should adopt a secure software development framework with a memory safety roadmap. Prioritize fixing vulnerabilities in sensitive areas, such as network-facing code and cryptographic functions. Following secure coding practices will significantly lower the likelihood of such security vulnerabilities.

Default passwords

Shipping products with default passwords is a dangerous practice. Default credentials are often easy to guess or publicly documented, making systems vulnerable to unauthorized access.

Always require users to set unique, strong passwords during installation.

Security features

Lack of multi-factor authentication (MFA)

Failing to include MFA in products that authenticate users significantly weakens security. Passwords alone are insufficient to protect against breaches.

Ensure MFA is supported in all products, especially for admin accounts. This practice is crucial for secure development and reducing security risks in critical systems. Aligning MFA with a secure software development lifecycle further strengthens defenses.

 

Inadequate logging for intrusions

Products without robust logging capabilities make it difficult for customers to detect and investigate intrusions. Logs should include critical data, such as configuration changes and user activities.

Software manufacturers should provide industry-standard logging features. For SaaS and cloud computing products, include at least six months of log retention. Enhanced network monitoring and cloud security tools help organizations meet key security requirements.

Organizational processes

Releasing software with known vulnerabilities

Releasing software that includes known exploitable vulnerabilities undermines security. Attackers often exploit these flaws before patches are issued.

Manufacturers must follow secure software development lifecycle practices, including scanning for vulnerabilities before release. Maintain a software bill of materials (SBOM) to track dependencies and ensure timely updates. Cloud security solutions and firewalls can further mitigate these risks.

Failing to disclose vulnerabilities

Not publishing CVEs (Common Vulnerabilities and Exposures) for critical flaws reduces transparency and puts users at risk. Customers depend on timely information to manage vulnerabilities.

Publish CVEs for all high-impact vulnerabilities promptly. Include details like CWE (Common Weakness Enumeration) codes to guide customers in understanding and mitigating risks. Conduct security awareness training for teams to improve processes and meet secure software development security requirements.

Case study: Successful software security with NordLayer

WeTransfer needed a reliable and flexible VPN to support global operations and meet ISO 27001 standards. Their outdated, on-site VPN couldn’t handle an office move or provide secure access for teams across 130+ regions. This created risks like phishing and ransomware.

NordLayer’s cloud-native solution offered a Dedicated server with Fixed IP for secure connectivity, Shared Gateway locations for secure internet access, and adaptive Okta integration to improve access control.

Switching to NordLayer improved operations. Developers can work faster with reduced network latency and secure access via NordLayer’s Business VPN. NordLayer also supported WeTransfer’s ISO 27001 compliance efforts. NordLayer’s platform helped WeTransfer secure its network and protect millions of users worldwide.

Explore our cybersecurity solutions for software development, or contact our sales team to learn how NordLayer can secure your operations.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What Is Identity And Access Management?

If you asked an IT expert for a definition of identity and access management, also known as simply “IAM,” they would probably tell you that it is a cybersecurity discipline that, when followed, can help a given organization provide their employees with access to the IT tools that they need to perform their jobs efficiently.

In other words, IAM is a framework that allows companies to significantly boost their cybersecurity. This is done by restricting access to organizational resources to only those people whose identity has been confirmed and who have been assigned specific access privileges.

How does IAM work?

By definition, the goal of today’s IAM systems is to perform two core tasks: authentication and authorization. Both of these play a part in making sure that the right person will get access to the right resources for the right reasons. The process usually goes as follows:

  1. An IAM system confirms the identity of a given user by authenticating their credentials against a database that contains all users’ identities and access privileges.

  2. The IAM system provides that user with access to only those resources to which they were assigned.

An IAM system usually includes a series of dedicated tools which operators can use to easily create, monitor, modify, and delete access privileges for all members of the organization.

The role IAM plays in security

If you’re still asking yourself the question “What is IAM in cybersecurity?”, we are here to tell you that IAM is considered a critical part of cybersecurity these days and that every organization should incorporate it into its cybersecurity strategy. Why? Because IAM security is concerned with reducing identity-related access risks, improving legal compliance, and improving business performance across the entire organization.

What is more, by helping companies manage digital identities and user access to company data, IAM tools make it very hard for non-authorized parties to hack into business networks and cause problems that could lead to big financial losses.

Enterprise identity and access management

As you can probably guess, “enterprise identity and access management” is a phrase that refers to all of the IAM policies, processes, and tools that large-scale businesses can use to manage access to their data and resources more securely and effectively.

Many of today’s enterprise-like organizations have massive IT infrastructures that consist of a vast range of servers, databases, applications, and cloud environments — to which dozens, if not hundreds or thousands, of their employees must have easy access. Enterprise IAM solutions are, therefore, a way for those big enterprises to make their resources available to a large number of employees without making any compromises in regard to cybersecurity.

So, even if your business is a global one — that is, you have thousands of employees and run multiple projects around the world — many of the IAM solutions available today are powerful and flexible enough to give you the ability to manage user permissions and prevent unauthorized access with ease.

What is the difference between identity management and access management?

The difference between identity management and access management essentially boils down to the part each of these two frameworks plays in the process of providing users with access to company resources.

Identity management is about (as its name suggests) user identities and the many ways they can be recognized and verified. Access management, on the other hand, deals with giving or withdrawing permissions and access privileges.

IAM regulatory compliance

Many of today’s lawmakers around the world are striving towards creating and introducing new policies that will help protect the digital lives of their citizens. As a result, many of today’s data privacy regulations (including HIPAA, SOC2, and PCI DSS) require businesses to follow strict IAM policies, which means they are obligated to manage access to data very carefully.

Luckily, identity and access management solutions can be used to meet some of the compliance requirements — which is also one of the reasons why enterprises are interested in making them part of their IT environments.

Let us provide you with an example. To comply with the already-mentioned information security standard called PCI DSS, a vendor is required to establish strict IAM policies (including rules that clearly define user identities, authentication, and authorization methods), and processes that restrict access to environments where cardholder data is stored. Only with such IAM policies in place can a vendor become fully compliant with the PCI DSS standard.

Identity and access management benefits

Implementing IAM solutions offers numerous benefits for businesses, regardless of their size or location. These include:

  1. Enhanced cybersecurity – IAM solutions can help all businesses – no matter their size or location – prevent data breaches and protect themselves against malware, identity theft, and phishing attacks.

  2. Simplified work for IT administrators — With the use of IAM tools, IT administrators can develop new, advanced security policies and processes and implement them across the entire organization in a blink of an eye.

  3. Real-time monitoring of company data access — IAM solutions allow you to remain in control of who can access what at your organization.

  4. Ensuring compliance with data privacy regulations — IAM systems are designed to help users comply with legal requirements such as HIPAA, SOC2, and PCI DSS.

  5. Minimizing financial and reputational losses — By allowing you to prevent fraudulent activities and unauthorized use of company resources, IAM solutions can help you maintain business continuity and avoid costly downtime.

Enterprise identity and access management with NordPass

NordPass Enterprise, an encrypted password, and passkey management platform, can be used as an IAM tool to securely provide members of your organization with access to company data, systems, and applications. How so?

First of all, when you use the Business version of the NordPass platform, you can share an unlimited number of digital entry points that you can assign to different departments or teams. This means that you can fully control access to shared credentials, payment information, and other sensitive data across the entire organization. Moreover, thanks to features such as the Activity Log, you can easily monitor all company logins to know exactly who accessed what and when.

Second, NordPass uses multi-factor authentication (MFA), as well as the single sign-on (SSO) authentication method, to identify and verify each and every user once they try to access one of the company accounts. The platform is equipped with three MFA options — an authenticator app, a security key, and backup codes — so that you can provide your team members with a few options in regard to how they can gain access to company resources.

Third, NordPass can help you achieve regulatory compliance. As mentioned, some standards (e.g., HIPAA and NIST) require organizations to implement secure access management solutions. With NordPass, not only can you easily manage access privileges, but you can also establish rules, procedures, and policies that will allow your company to meet certain specifications.

Of course, the fact that NordPass is an encrypted password management solution also means that you and your team members can use it to securely and easily generate, store, manage, and share company credentials. This is something that IAM tools cannot do — just as they cannot run password health check-ups or scan for data breaches to see if any of the credentials, payment information, or emails have been compromised – but NordPass can.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The complete guide to boosting data security in cloud computing

Summary: Discover top strategies to secure your cloud data with NordLayer, from encryption to micro-segmentation. Keep your data safe in the cloud.

According to Gartner, over 80% of organizations will take a cloud-first approach in 2025. This prediction highlights how cloud computing has become the go-to for flexible, cost-effective operations. The benefits of on-premise to cloud migration are clear: scalability, efficiency, savings, and stronger data protection in a cloud environment.

However, as businesses rely more on the cloud to store, manage, and exchange data, they can also become a bigger target for cyber threats. That’s why data protection is more important than ever. In this article, we will share tips on how to boost your data security in cloud computing.

Basics of data security in cloud computing

Cloud data security includes tools and policies that protect data in the cloud from loss, leakage, or misuse. This helps prevent breaches, data theft, and unauthorized access.

A good cloud security strategy focuses on securing data across networks, applications, containers, and other cloud environments. It also controls who can access data and ensures complete visibility of data on the network. The strategy must protect data in three main ways:

  • Data in use: Secure data while it’s being used by apps or devices through authentication and access control.
  • Data in transit: Protect sensitive data as it moves across the network with encryption and other security methods.
  • Data at rest: Keep stored data safe with access restrictions and authentication.

Cloud environments can be public, private, or a mix of both. Regardless of the environment, the key to strong cloud data security is combining robust access controls, encryption, and continuous monitoring.

Cloud data security: Who is responsible for what?

Cloud security is a shared responsibility between the organization and its cloud service provider (CSP), with the exact breakdown depending on the cloud service. However, 73% of organizations don’t fully understand their role in cloud security responsibilities, which may lead to blind spots.

The cloud service provider (CSP) is responsible for securing the cloud infrastructure, which includes the physical hardware, network, and services like computing, storage, and databases. They also provide security tools to help customers configure their security settings.

The customer, on the other hand, is responsible for cloud data security. Always. Here is how it breaks down in more detail:

  • Private cloud: Since the cloud is hosted in its own data center, the organization handles all cloud security. This includes the physical network, infrastructure, hypervisor, virtual network, operating systems, firewalls, service configuration, identity and access management, and all aspects of data security.
  • Public cloud: In public clouds, like Google Cloud, Amazon Web Services, or Microsoft Azure, the CSP manages infrastructure and network security. The customer manages their apps, data, and access.
  • SaaS: The vendor secures the platform, including physical, infrastructure, and application security. The customer is responsible for their data and access security.

The bottom line is that organizations can’t depend on cloud vendors for data security. No matter the cloud model, they must continue to protect their data.

Why protecting data in the cloud is essential

With the increase of remote work, cloud services, and IoT devices, attack surfaces have grown, making sensitive data more vulnerable than ever. This growing trend makes data security a top concern for organizations.

The main reasons for protecting data security in the cloud are meeting compliance regulations, maintaining trust, and keeping sensitive information safe.

#1 Meet compliance standards

Organizations across industries must follow various data security regulations to safeguard sensitive information. Whether it’s protecting customer data, financial records, or healthcare information, compliance is non-negotiable. Breaking these rules can lead to fines, legal trouble, and costly disruptions.

But it’s not just about avoiding fines—customers and partners expect their data to be handled safely. Good security practices help meet those requirements and show others you can be trusted.

#2 Protect your brand reputation

A data breach can severely damage your company’s reputation. When customers lose trust, they might take their business elsewhere, and it’s tough to win them back.

The damage to a brand often costs more than fixing the breach itself. Years of hard work can be undone in days. By keeping data secure, you’re protecting your reputation and customer confidence in your brand.

#3 Keep your sensitive information safe

Organizations store vast amounts of valuable data, from trade secrets and intellectual property to customer information and operational systems. Cybercriminals know this and target that information to steal or disrupt operations.

Beyond stealing data, some attacks shut down systems or even critical infrastructure, causing major problems. Comprehensive security keeps your valuable data and systems safe so your business can run without interruptions.

Why storing data in the cloud is a smart choice

More and more organizations are adopting cloud computing because it helps digital transformation and offers practical benefits. By storing data in the cloud, businesses can gain advantages like lower costs, better resource use, easier access, and scalability.

Cloud computing simplifies teamwork from anywhere and gives access to tools and technologies without big upfront costs. Its flexibility and reliability make it a key part of modern business growth.

Let’s have a look at the benefits of storing data in the cloud.

Reduced costs

Cloud storage is often more affordable because the costs of servers and infrastructure are shared across many users. Instead of paying for expensive on-site systems, businesses can use cloud solutions to save money without sacrificing performance.

Better resource use

In a cloud model, the cloud service provider (CSP) handles all the maintenance—servers, hardware, databases, and other infrastructure. This means businesses no longer need to manage on-premises systems or dedicate time and money to keeping them up and running.

Easier access

Cloud-based databases can be accessed by authorized users from any device and location, as long as there’s an internet connection. This level of accessibility is essential for remote employees, where teams need to collaborate seamlessly, no matter where they are.

Scalability

Cloud resources are flexible. Businesses can quickly scale their databases up or down to handle changes in demand. Whether managing seasonal spikes, supporting a growing customer base, or dealing with unexpected surges, the cloud makes it easier and more cost-effective to adjust resources as needed.

Business risks to storing data in the cloud

While cloud storage has many benefits, it also comes with cloud security risks. Here are some challenges businesses may face if proper security measures aren’t in place.

Data breaches

Data breaches in the cloud happen differently from those in on-premises systems. Attackers often exploit misconfigurations, weak access controls, stolen credentials, and other security gaps instead of relying on malware.

Misconfigurations

Misconfigurations are the leading security risk in the cloud. They can result in overly broad account permissions, poor logging, and other gaps that make organizations vulnerable to data breaches, insider threats, and attacks by external adversaries.

Unsecured APIs

APIs connect services and transfer data, but they can create security risks. Changes in data policies or privilege levels can make it easier for unauthorized users to access more data than intended, especially if APIs are not properly secured.

Access control and unauthorized access

In multi-cloud or hybrid environments, organizations often rely on the default access controls provided by their cloud services. This can create issues, particularly when insider threats exploit their privileged access to cause damage or hide their actions.

Compliance and regulatory challenges

Data storage in the cloud must follow rules like GDPR, CCPA, and HIPAA. If your business doesn’t comply, it could face fines and damage its reputation. To stay compliant, businesses must ensure their cloud services meet these rules and handle data correctly.

Shared responsibility model

In the shared responsibility model, security is split between the cloud provider and the business. If businesses don’t fully understand what they’re responsible for, it can create security gaps. Misunderstanding this division can leave systems vulnerable.

6 best practices for securing data in the cloud

To keep data safe, organizations need a strong data security plan that specifically tackles cloud-related risks. As cloud environments introduce unique vulnerabilities, a comprehensive security strategy must address these challenges. Here are six best practices to follow:

Use advanced encryption

Encrypting data is a great way to protect it. This changes data into unreadable text before it enters the cloud. Encrypt both data in transit and at rest. Cloud providers offer built-in encryption, but you can also use your tools for more control.

Implement a data loss prevention (DLP) tool

DLP tools help prevent data loss, leaks, or misuse. They also detect unauthorized access or data breaches. Before you choose a DLP tool, make sure it is designed for a cloud environment.

Ensure visibility across your cloud environments

Get full visibility into your private, hybrid, and multi-cloud environments. This helps detect issues like misconfigurations, vulnerabilities, and security threats. Cloud security monitoring provides insights that guide actions to fix problems.

Make compliance your priority

Implementing the Zero Trust approach helps align your security policies with industry and government standards. Built on the principle of trust no one, verify everything, it ensures that only authorized users and compliant devices can access sensitive data.

Additionally, Device Posture Security lets you monitor devices connecting to your company network and block non-compliant ones based on predefined rules.

Strengthen identity and access management (IAM)

Identity and access management tools help manage who can access specific resources. They automate tasks like assigning access, updating privileges, and removing accounts. Follow the principle of least privilege—give users only the access they need for their roles.

Securing your data in the cloud with NordLayer

Protecting your data in the cloud is more than just encryption. It’s about implementing a robust, multi-layered security strategy that covers all aspects of cloud access and control.

Here’s how NordLayer can help you take your cloud security to the next level:

  1. Secure Remote Access: With NordLayer’s Site-to-Site VPN, you can create a safe, encrypted tunnel to access your cloud, protecting your data from cyber risks.
  2. Access control: NordLayer’s Cloud Firewall allows you to implement micro-segmentation strategies, distributing different network access rights for specific users or teams. It adds an extra layer of protection for your critical data, ensuring compliance with stringent data security regulations.
  3. Device security: NordLayer’s Device Posture Security ensures that only authorized and compliant devices can access your network. It monitors device compliance and blocks user access from non-compliant devices to safeguard your resources.
  4. Multi-layered authentication: Enhance security with Single Sign-On (SSO) and multi-factor authentication (MFA) to double-check identities seamlessly. 

Get in touch with our sales team today to see how NordLayer’s solutions can strengthen your cloud data security. Also, be sure to download our Data Security Guide for more in-depth tips and actionable strategies.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×