Vandana Sharma,
- Leading Technology Organization, San Francisco Bay Area, California, USA
Abstract
In today’s rapidly evolving digital landscape, coding professionals serve as the architects shaping our technological future. Whether they are web developers, software engineers, cybersecurity specialists, or data analysts, these experts are responsible for building, designing, and securing the digital frameworks that power modern society. Their work ensures that systems function seamlessly, and vast amounts of data are kept safe. However, the growing dependence on technology and digital infrastructure has attracted the attention of cybercriminals. These malevolent entities, ranging from individual rogue hackers to organized nation-state attackers, continuously seek vulnerabilities in the very systems coding professionals meticulously create. As their roles become increasingly pivotal, developers and engineers face a growing range of cybersecurity threats. These threats can disrupt software integrity, expose sensitive data, and inflict significant financial or reputational damage. Given the persistent and evolving nature of these threats, coding professionals must adopt robust, proactive strategies to safeguard both personal and client information. By staying vigilant and up to date with the latest security practices, coding experts can mitigate risks and ensure that the foundations they build remain resilient against an array of cyber threats. This proactive stance enables them to maintain the integrity of our digital world, ensuring it remains a safe and functional environment.
Keywords: Cybersecurity for developers, data breaches, software development security, secure coding practices, cyber threats, software development life cycle (SDLC) security, cyberattacks, data protection, encryption, access control, software vulnerabilities, secure software development, developer security practices, cybersecurity strategies, digital infrastructure security
[This article belongs to International Journal of Information Security Engineering ]
Vandana Sharma. Dodging Data Breaches: Cybersecurity for Developers. International Journal of Information Security Engineering. 2024; 02(02):8-13.
Vandana Sharma. Dodging Data Breaches: Cybersecurity for Developers. International Journal of Information Security Engineering. 2024; 02(02):8-13. Available from: https://journals.stmjournals.com/ijise/article=2024/view=180384
References
- Palo Alto Networks. (2015). Demystifying cybersecurity for mid-market organizations. [online] Palo Alto Networks. Available from: https://www.paloaltonetworks.com/industry/japac-mid-market-solutions?
- Cloud Security Alliance. (2023). Best practices for cloud security. [online] Cloud Security Alliance. Available from: https://cloudsecurityalliance.org/blog/2022/04/23/cloud-security-best-practices-from-the-cloud-security-alliance
- Verizon. (2023). Data Breach Investigations Report (DBIR) 2023. [online] Verizon. Available from: https://www.verizon.com/business/resources/reports/dbir/
- National Institute of Standards and Technology (NIST). (2016). Cybersecurity framework. Cybersecurity & NIST. [online] National Institute of Standards and Technology (NIST). Available from: https://www.nist.gov/cybersecurity
- Microsoft. (2022). Best practices for access control and identity management. [online] Microsoft. Available from: https://learn.microsoft.com/en-us/security/zero-trust/develop/identity-iam-development-best-practices
- Center for Internet Security (CIS). (2023). CIS controls v8. [online] Center for Internet Security (CIS). Available from: https://www.cisecurity.org/controls/v8
- Cisco. 2023. The importance of encryption in cybersecurity. [online] Cisco Secure. Available from: https://www.cisco.com/c/en/us/products/security/encryption-explained.html
- ISACA. (2023). Cybersecurity governance best practices. [online] Information Systems Audit and Control Association. Available from: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2023/how-cybersecurity-best-practices-are-evolving-to-manage-ongoing-threats
- National Cyber Security Centre (NCSC). (2022). Guidance on secure software development. [online] NCSC. Available from: https://www.ncsc.gov.uk/collection/developers-collection
- Google. (2023). Zero trust security for cloud workloads. [online] Google Cloud. Available from: https://cloud.google.com/learn/what-is-zero-trust
- OWASP Foundation. (2024). OWASP Top Ten. [online] OWASP Foundation. Available from: https://owasp.org/www-project-top-ten/
- SANS Institute. (2024). Secure software development and code analysis tools. [online] SANS Institute. Available from: https://www.sans.org/white-papers/389/
- Ponemon Institute. (2023). Cost of a Data Breach Report 2023. [online] IBM. Available from: https://www.ibm.com/reports/data-breach
- Gartner. (2023). Top cybersecurity trends in 2023. [online] Gartner Research. Available from: https://www.gartner.com/en/cybersecurity/topics/cybersecurity-trends
- Jarunde N. The future of the finance workforce: How Microsoft copilot may reshape roles and skillsets. Int J Fin. 2024;9:32–41. DOI: 10.47941/ijf.1918.
- Brendon Rod. (2024). Key Takeaways from the IBM 2024 Cost of a Data Breach Report. The Cost of Cybersecurity Failures: The 2024 IBM Data Breach Report. [online] acsense. Available from: https://acsense.com/blog/ibm-2024-cost-of-data-breach-report/ [Accessed 4 Jan. 2025].
- Cybersecurity Ventures. (2023). Cybersecurity Ventures. 2023 Security Awareness Training Report. Market predicted to grow from $5.6B in 2023 to $10B+ in 2027. [online] Cybersecurity Ventures. Available from: https://cybersecurityventures.com/wp-content/uploads/2023/04/Security-Awareness-Training-Report-2023-1.pdf.
- Ponemon Institute. (2021). The Economic Value of Prevention in the Cybersecurity Lifecycle. [online] Ponemon Institute. Available from: https://www.ponemon.org/research/ponemon-library/security/the-economic-value-of-prevention-in-the-cybersecurity-lifecycle.html.
Volume | 02 |
Issue | 02 |
Received | 15/09/2024 |
Accepted | 03/10/2024 |
Published | 28/10/2024 |