Trustwave achieves verified MXDR solution and FastTrack ready partner status from Microsoft. Learn More

Trustwave achieves verified MXDR solution and FastTrack ready partner status from Microsoft. Learn More

Services
Capture
Managed Detection & Response

Eradicate cyberthreats with world-class intel and expertise

twi-cloud-lock-color-svg
Managed Security Services

Expand your team’s capabilities and strengthen your security posture

twi-briefcase-color-svg
Consulting & Professional Services

Tap into our global team of tenured cybersecurity specialists

twi-dashboard-color-svg
Penetration Testing

Subscription- or project-based testing, delivered by global experts

twi-database-color-svg
Database Security

Get ahead of database risk, protect data and exceed compliance requirements

twi-email-color-svg
Email Security & Management

Catch email threats others miss with layered security & maximum control

twi-managed-portal-color
Co-Managed SOC (SIEM)

Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
The Trustwave Approach
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Platform
SpiderLabs Fusion Center
Security Operations Centers
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

They’re Watching You: How to Reduce Dwell Time in Your Environment

Everyone likes to hear a good hero story, like a serial killer being apprehended or a child being saved from a burning building. However, often, we don’t get the complete picture. How long did it take before the killer was finally caught? How about the child? Were they trapped long enough before smoke may have impacted their long-term health?

The time metric of often the most difficult to face, that’s why discussing dwell time is kind of like the elephant in the room that no one on within the security organization likes to acknowledge. If you’re not familiar with dwell time as a security professional, you certainly should be.

It’s the period that begins when an attacker first penetrates the perimeter of a network, until the moment they’re identified and removed. The stage in-between those two pivotal moments is where the damage can be done for an organization.

Depending on the skillset of the attack, this time can range drastically, says Brian Hussey, vice president of cyber threat detection and response at Trustwave.

“Advanced APT threat actors are very good at [laying low] and ‘living off the land’ by using system administration and Window tools, not a lot of [noticeable] malware,” Hussey says.

According to the Trustwave’s 2019 Global Security Report, in some cases, attackers have access to compromised environments for more than one year. While it may seem like an embarrassing metric to report on since it’s deemed unacceptable for an organization not to know about a malicious actor in their environment, this metric is an important benchmark for a security organization.

In the full discussion with Hussey featured below, he focuses on providing security leaders with advice on what they can do to reduce dwell time in their environment.

Taking an adaptive security approach is the best way to get ahead of threats and reduce dwell time within your environment. Learn how Trustwave can help you get there through Managed Detection & Response and leveraging Proactive Threat Hunts.

 

 

Marcos Colón is the content marketing manager at Trustwave and a former IT security reporter and editor.