Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

NASDAQ News Renews Focus (sort of)

Reactive security is a common theme within many organizations and the reaction is usually not swift. Anticipation of threats via news reports is a dangerous game. Every time there is a major news item about a breach or malware incident, the calls come in. Speaking with peers within the information security industry, they get the calls too. Fear is a powerful motivator. The fact is that nothing has substantively changed. The world is just as secure, or insecure, as it was last week. Fear and reactive security aside, the focus on security is a good thing.

The old cliché that "generals are always prepared for the last war" can also be applied to information security. Reacting to the last headline may marginally improve security, but is unlikely to prevent most future attacks. Trying to guess the next headline vulnerability is even less likely to succeed.

A strong defense is based on universal principles and practices that collectively protect an organization's assets. More succinctly, this can be described as the ever-popular "best-practices". Patching, regular security testing, diligent user management, application monitoring & filtering, least required privileges, log monitoring, and strong network segmentation are just a few examples of security controls that every organization should implement.

Very few breaches are the result of only a single mistake. Usually, a single vulnerability allows an initial beachhead into the target's environment, but additional vulnerabilities must be exploited before the final goal is reached. A simple example can be made with SQL injection in an ecommerce website. SQL injection allows an attacker to access the application's database, but a second vulnerability of poor (or no) encryption practices must be present before sensitive data can be extracted. This scenario also implies that regular security testing, developer security training, and application filtering were also not being used. All of these deficiencies had to be in place for the exploit to take place.

Last year, Trustwave's SpiderLabs was testing some well-known third party software for one of our clients. We found some significant vulnerabilities in the software's web-based management tool. In many organizations, the findings would have warranted a high-risk label because of the potential impact. However, our client had a number of strong security controls setup (primarily related to network filtering) that made exploitation effectively impossible. The only reason we were able to find the vulnerability was that they disabled some of the controls for our tests. As a result of these controls, the practical risk was effectively reduced from "high" to "low". As far as we know, the client did not employ psychics to predict future vulnerabilities, but they were still protected.

The bottom line is that security "best-practices" weren't invented by consultants as a bizarre form of entertainment; they really do work while reactive security does not.

Latest SpiderLabs Blogs

Network Isolation for DynamoDB with VPC Endpoint

DynamoDB is a fully managed NoSQL database service offered by Amazon Web Services (AWS). It is renowned for its scalability, dependability, and easy connection with other AWS services....

Read More

The Underdog of Cybersecurity: Uncovering Hidden Value in Threat Intelligence

Threat Intelligence, or just TI, is sometimes criticized for possibly being inaccurate or outdated. However, there are compelling reasons to incorporate it into your cybersecurity defense strategy....

Read More

Clockwork Blue: Automating Security Defenses with SOAR and AI

It’s impractical to operate security operations alone, using manual human processes. Finding opportunities to automate SecOps is an underlying foundation of Zero Trust and an essential architecture...

Read More