Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More

Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

NASDAQ News Renews Focus (sort of)

Reactive security is a common theme within many organizations and the reaction is usually not swift. Anticipation of threats via news reports is a dangerous game. Every time there is a major news item about a breach or malware incident, the calls come in. Speaking with peers within the information security industry, they get the calls too. Fear is a powerful motivator. The fact is that nothing has substantively changed. The world is just as secure, or insecure, as it was last week. Fear and reactive security aside, the focus on security is a good thing.

The old cliché that "generals are always prepared for the last war" can also be applied to information security. Reacting to the last headline may marginally improve security, but is unlikely to prevent most future attacks. Trying to guess the next headline vulnerability is even less likely to succeed.

A strong defense is based on universal principles and practices that collectively protect an organization's assets. More succinctly, this can be described as the ever-popular "best-practices". Patching, regular security testing, diligent user management, application monitoring & filtering, least required privileges, log monitoring, and strong network segmentation are just a few examples of security controls that every organization should implement.

Very few breaches are the result of only a single mistake. Usually, a single vulnerability allows an initial beachhead into the target's environment, but additional vulnerabilities must be exploited before the final goal is reached. A simple example can be made with SQL injection in an ecommerce website. SQL injection allows an attacker to access the application's database, but a second vulnerability of poor (or no) encryption practices must be present before sensitive data can be extracted. This scenario also implies that regular security testing, developer security training, and application filtering were also not being used. All of these deficiencies had to be in place for the exploit to take place.

Last year, Trustwave's SpiderLabs was testing some well-known third party software for one of our clients. We found some significant vulnerabilities in the software's web-based management tool. In many organizations, the findings would have warranted a high-risk label because of the potential impact. However, our client had a number of strong security controls setup (primarily related to network filtering) that made exploitation effectively impossible. The only reason we were able to find the vulnerability was that they disabled some of the controls for our tests. As a result of these controls, the practical risk was effectively reduced from "high" to "low". As far as we know, the client did not employ psychics to predict future vulnerabilities, but they were still protected.

The bottom line is that security "best-practices" weren't invented by consultants as a bizarre form of entertainment; they really do work while reactive security does not.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo